0% found this document useful (0 votes)
41 views

Websecurity

1) AJAX stands for Asynchronous JavaScript and XML. The XMLHttpRequest object accomplishes asynchronous data exchange between the browser and server. 2) The Document Object Model provides the ability to dynamically interact with web page layout. 3) Internet Explorer is the least optimized for Microsoft's version of AJAX.

Uploaded by

Samiksha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

Websecurity

1) AJAX stands for Asynchronous JavaScript and XML. The XMLHttpRequest object accomplishes asynchronous data exchange between the browser and server. 2) The Document Object Model provides the ability to dynamically interact with web page layout. 3) Internet Explorer is the least optimized for Microsoft's version of AJAX.

Uploaded by

Samiksha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1)AJAX Stands for:

A: Asynchronous Javascript and XML

B: Abstract JSON and XML

C: Another Java Abstraction for X-Windows

D: Another Java and XML Library

2)What does the XMLHttpRequest object accomplish in Ajax?

A: It's the programming language used to develop Ajax applications.

B: It provides a means of exchanging structured data between the Web server and client.

C: It provides the ability to asynchronously exchange data between Web browsers and a Web
server.

D: It provides the ability to mark up and style the display of Web-page text.

3)Of the following technologies, which one provides the ability to dynamically interact with Web
page layout?

A: JavaScript B: XML.

C: Document Object Model. D: HTML.

4)Which Web browser is the least optimized for Microsoft's version of AJAX?

A: Firefox B: Opera C: Safari D: Internet Explorer

5)_____ JavaScript is also called client-side JavaScript.

A: Microsoft B: Navigator C: LiveWire D: Native

6)A __________ is anything that can cause harm.

A: vulnerability B: phish C: threat D: spoof

7)A __________ is a small program embedded inside of a GIF image.


A: web bug B: cookie C: spyware application D: spam

8)A hacker contacts you my phone or email and attempts to acquire your password.

A: spoofing B: phishing C: spamming D: bugging

9)The phrase __________ describes viruses, worms, Trojan horse attack applets, and attack

scripts.

A: malware B: spam C: phish D: virus

10)A hacker that changes or forges information in an electronic resource, is engaging in

__________.

A: denial of service B: sniffing C: terrorism D: data diddling

11)Hackers often gain entry to a network be pretending to be at a legitimate computer.

A: spoofing B: forging C: IP spoofing D: ID theft

12)The __________ of a threat measures its potential impact on a system.

A: vulnerabilities B: countermeasures

C: degree of harm D: susceptibility

13)Which approach to the control of computer-based information systems might employ methods
such as distributing important assets across a wide geographical area or encrypting valuable data?

A: Prohibition B: Recovery. C: Obfuscation. D: Containment

14)In order to prevent any damage being caused to data by the failure of a storage device, such as a
hard disk drive, which of the following would you be most likely to use?

A: Backup site. B: Incremental backup

C: RAID D: Data warehouse

15)Which of the following is capable of altering its form in order to avoid discovery by certain virus
detection programs?
A: Polymorphic virus. B: Stealth virus C: Worm. D: Trojan

16)A security measure to stop unauthorized access to documents is:

A: network access control. B: business continuity/disaster recovery.

C: physical access restrictions. D: backup/restore.

You might also like