CSCI 631 Midterm Liberty University
- A good hash function is resistent to what?
- How does a user validate a digital certificate that is received from another user?
- Which one or more of the following are considered secure protocols for data in transit?
- Using knowledge associated with an attacker’s process to find weakness in the attack mechanism and then to catch and block the attacker is called what?
- What makes a digitally signed message different from an encrypted message?
- Which one of the following practices are not vulnerable to a broken access control according to OWASP?
- What is Diffie-Hellman most commonly used for?
- The concept of blocking an action unless it is specifically authorized is known as what?
- High-security browsers can use what to validate SSL credentials for a user?
- When a message is sent, no matter what its format, why do we care about its integrity?
- SSL provides which of the following functionalities?
- The use of certificates in SSL/TLS is similar to:
- Which of the following is used to strengthen passwords from brute-force attacks??
- Which one of the following practices are not vulnerable to an injection attack according to OWASP?
- A cross-site request forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they are currently authenticated.
- The management of keys to access data that is encrypted is not an important concern in protecting sensitive data.
- Describe in a few sentences what the definition of information leakage is and the security exposure it represents.
- Describe in a few sentences, why would a medium-sized firm implement a PKI solution? What business benefits would ensue from such a course of actions?
- Imagine you are a web developer for a small, locally owned business. Explain when using HTTP would be satisfactory, and why, and explain when you should use HTTPS, and why.
- According to the OWASP web site and other sources, define in a few sentences what a reflected XSS attack is and one or more attack consequences of a successful attack.
- Briefly describe in a few sentences at least three defenses for preventing SQL injection vulnerabilities.
- Describe three or more lessons derived from Lab 2 in terms of preventing sensitive data exposure.