Websecurity
Websecurity
B: It provides a means of exchanging structured data between the Web server and client.
C: It provides the ability to asynchronously exchange data between Web browsers and a Web
server.
D: It provides the ability to mark up and style the display of Web-page text.
3)Of the following technologies, which one provides the ability to dynamically interact with Web
page layout?
A: JavaScript B: XML.
4)Which Web browser is the least optimized for Microsoft's version of AJAX?
8)A hacker contacts you my phone or email and attempts to acquire your password.
9)The phrase __________ describes viruses, worms, Trojan horse attack applets, and attack
scripts.
__________.
A: vulnerabilities B: countermeasures
13)Which approach to the control of computer-based information systems might employ methods
such as distributing important assets across a wide geographical area or encrypting valuable data?
14)In order to prevent any damage being caused to data by the failure of a storage device, such as a
hard disk drive, which of the following would you be most likely to use?
15)Which of the following is capable of altering its form in order to avoid discovery by certain virus
detection programs?
A: Polymorphic virus. B: Stealth virus C: Worm. D: Trojan