SlideShare a Scribd company logo
1. Reflected and stored are types of XSS attacks.
2. An attack has occurred on your network. An attacker was able to traverse several files and folders, looking for
sensitive data. What type of attack has occurred?
3. AH is the protocol within IPSec used for encryption services.
4. As network administrator, you are concerned with the plaintext transmission of sensitive data on the network.
Which of the following protocols are used to help secure communications? (Select three.)
A. IPSec
. HITP
5. To increase network security, you have decided to use HTTPS on your shopping cart site. Which of the following
ports does HTTPS use?
A. 80
B. 53
C. 443
D. 51
6.
_____and AH are used to secure IPSec
transmissions.
7. CSRF attacks exploit the trust a Web site has in a user's Web browser.
8. Kerberos is a(n)___
protocol.
9. To increase overall communication security, you decide to implement 3DES encryption. Which of the following
statements is true of 3DES?
10. You are concerned about a cross-site forgery attack. Which of the following can you do to help prevent such an
attack?
11. To establish IPSec encryption, two hosts must create a shared key with each other before SA negotiations can
take place.
1- Reflected and stored are types of XSS attacks- 2- An attack has occ.docx

More Related Content

Similar to 1- Reflected and stored are types of XSS attacks- 2- An attack has occ.docx

Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
Rachel Phillips
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
ALIN BABU
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
DamaineFranklinMScBE
 
TM112 Meeting12-Cryptography.pptx
TM112 Meeting12-Cryptography.pptxTM112 Meeting12-Cryptography.pptx
TM112 Meeting12-Cryptography.pptx
MohammedYusuf609377
 
Integrity and Privacy through Authentication Key Exchange Protocols for Distr...
Integrity and Privacy through Authentication Key Exchange Protocols for Distr...Integrity and Privacy through Authentication Key Exchange Protocols for Distr...
Integrity and Privacy through Authentication Key Exchange Protocols for Distr...
BRNSSPublicationHubI
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
Mohamed Loey
 
Network security protocols.pptx
Network security protocols.pptxNetwork security protocols.pptx
Network security protocols.pptx
SamyLacheheub
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
CSCJournals
 
HTTPI BASED WEB SERVICE SECURITY OVER SOAP
HTTPI BASED WEB SERVICE SECURITY OVER SOAP HTTPI BASED WEB SERVICE SECURITY OVER SOAP
HTTPI BASED WEB SERVICE SECURITY OVER SOAP
IJNSA Journal
 
Authenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallelAuthenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallel
jpstudcorner
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
Universitas Pembangunan Panca Budi
 
SURVEY OF UNITED STATES RELATED DOMAINS: SECURE NETWORK PROTOCOL ANALYSIS
SURVEY OF UNITED STATES RELATED DOMAINS: SECURE NETWORK PROTOCOL ANALYSISSURVEY OF UNITED STATES RELATED DOMAINS: SECURE NETWORK PROTOCOL ANALYSIS
SURVEY OF UNITED STATES RELATED DOMAINS: SECURE NETWORK PROTOCOL ANALYSIS
IJNSA Journal
 
Key Terms Quiz Use terms from the Key Terns list to complete the sen-.docx
Key Terms Quiz Use terms from the Key Terns list to complete the sen-.docxKey Terms Quiz Use terms from the Key Terns list to complete the sen-.docx
Key Terms Quiz Use terms from the Key Terns list to complete the sen-.docx
VictorXUQGloverl
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
 
Hallwaze security snapshot
Hallwaze security snapshotHallwaze security snapshot
Hallwaze security snapshot
hallwaze_1
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
IJRAT
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
International Journal of Computer and Communication System Engineering
 

Similar to 1- Reflected and stored are types of XSS attacks- 2- An attack has occ.docx (20)

Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
TM112 Meeting12-Cryptography.pptx
TM112 Meeting12-Cryptography.pptxTM112 Meeting12-Cryptography.pptx
TM112 Meeting12-Cryptography.pptx
 
Integrity and Privacy through Authentication Key Exchange Protocols for Distr...
Integrity and Privacy through Authentication Key Exchange Protocols for Distr...Integrity and Privacy through Authentication Key Exchange Protocols for Distr...
Integrity and Privacy through Authentication Key Exchange Protocols for Distr...
 
Web Security
Web SecurityWeb Security
Web Security
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Network security protocols.pptx
Network security protocols.pptxNetwork security protocols.pptx
Network security protocols.pptx
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
 
HTTPI BASED WEB SERVICE SECURITY OVER SOAP
HTTPI BASED WEB SERVICE SECURITY OVER SOAP HTTPI BASED WEB SERVICE SECURITY OVER SOAP
HTTPI BASED WEB SERVICE SECURITY OVER SOAP
 
Authenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallelAuthenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallel
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
 
SURVEY OF UNITED STATES RELATED DOMAINS: SECURE NETWORK PROTOCOL ANALYSIS
SURVEY OF UNITED STATES RELATED DOMAINS: SECURE NETWORK PROTOCOL ANALYSISSURVEY OF UNITED STATES RELATED DOMAINS: SECURE NETWORK PROTOCOL ANALYSIS
SURVEY OF UNITED STATES RELATED DOMAINS: SECURE NETWORK PROTOCOL ANALYSIS
 
Key Terms Quiz Use terms from the Key Terns list to complete the sen-.docx
Key Terms Quiz Use terms from the Key Terns list to complete the sen-.docxKey Terms Quiz Use terms from the Key Terns list to complete the sen-.docx
Key Terms Quiz Use terms from the Key Terns list to complete the sen-.docx
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
Hallwaze security snapshot
Hallwaze security snapshotHallwaze security snapshot
Hallwaze security snapshot
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 

More from Nicholas3uGPooled

1- The following represent various stages of cell division (mitosis-me.docx
1- The following represent various stages of cell division (mitosis-me.docx1- The following represent various stages of cell division (mitosis-me.docx
1- The following represent various stages of cell division (mitosis-me.docx
Nicholas3uGPooled
 
1- In cats- again- black color is dominant to a special- temperature-s.docx
1- In cats- again- black color is dominant to a special- temperature-s.docx1- In cats- again- black color is dominant to a special- temperature-s.docx
1- In cats- again- black color is dominant to a special- temperature-s.docx
Nicholas3uGPooled
 
1- The ability of a virus to infect one type of organism and not anoth.docx
1- The ability of a virus to infect one type of organism and not anoth.docx1- The ability of a virus to infect one type of organism and not anoth.docx
1- The ability of a virus to infect one type of organism and not anoth.docx
Nicholas3uGPooled
 
1- The 3-part- multiple human brain refers to the A- brainstem- limbi.docx
1- The 3-part- multiple human brain refers to the  A- brainstem- limbi.docx1- The 3-part- multiple human brain refers to the  A- brainstem- limbi.docx
1- The 3-part- multiple human brain refers to the A- brainstem- limbi.docx
Nicholas3uGPooled
 
1- System in science- Types- Feedbacks 2- Nature of Physical Geography.docx
1- System in science- Types- Feedbacks 2- Nature of Physical Geography.docx1- System in science- Types- Feedbacks 2- Nature of Physical Geography.docx
1- System in science- Types- Feedbacks 2- Nature of Physical Geography.docx
Nicholas3uGPooled
 
1- T-F- Annual borius plans are long-term executive inctitives- and at.docx
1- T-F- Annual borius plans are long-term executive inctitives- and at.docx1- T-F- Annual borius plans are long-term executive inctitives- and at.docx
1- T-F- Annual borius plans are long-term executive inctitives- and at.docx
Nicholas3uGPooled
 
1- Select all that apply- Software testing is a process that helps in.docx
1- Select all that apply- Software testing is a process that helps in.docx1- Select all that apply- Software testing is a process that helps in.docx
1- Select all that apply- Software testing is a process that helps in.docx
Nicholas3uGPooled
 
1- Pandoravirus salinus is virus that infects amoeba- is very large (1.docx
1- Pandoravirus salinus is virus that infects amoeba- is very large (1.docx1- Pandoravirus salinus is virus that infects amoeba- is very large (1.docx
1- Pandoravirus salinus is virus that infects amoeba- is very large (1.docx
Nicholas3uGPooled
 
1- Joe Smith works in the IT department of a large industrial company-.docx
1- Joe Smith works in the IT department of a large industrial company-.docx1- Joe Smith works in the IT department of a large industrial company-.docx
1- Joe Smith works in the IT department of a large industrial company-.docx
Nicholas3uGPooled
 
1- In order to beat- the heart requires A- nervous system input B- h.docx
1- In order to beat- the heart requires  A- nervous system input  B- h.docx1- In order to beat- the heart requires  A- nervous system input  B- h.docx
1- In order to beat- the heart requires A- nervous system input B- h.docx
Nicholas3uGPooled
 
1- In terms of the environment of early earth- what resulted from the.docx
1- In terms of the environment of early earth- what resulted from the.docx1- In terms of the environment of early earth- what resulted from the.docx
1- In terms of the environment of early earth- what resulted from the.docx
Nicholas3uGPooled
 
1- Identify one job position to develop- compentency based job descrip.docx
1- Identify one job position to develop- compentency based job descrip.docx1- Identify one job position to develop- compentency based job descrip.docx
1- Identify one job position to develop- compentency based job descrip.docx
Nicholas3uGPooled
 
1- Implement a Python function that accepts an positive integer and re.docx
1- Implement a Python function that accepts an positive integer and re.docx1- Implement a Python function that accepts an positive integer and re.docx
1- Implement a Python function that accepts an positive integer and re.docx
Nicholas3uGPooled
 
1- How may have the complex lifestyle of digentic trematodes evolved-.docx
1- How may have the complex lifestyle of digentic trematodes evolved-.docx1- How may have the complex lifestyle of digentic trematodes evolved-.docx
1- How may have the complex lifestyle of digentic trematodes evolved-.docx
Nicholas3uGPooled
 
1- identify and discuss the two most imporant factors in population dy (1).docx
1- identify and discuss the two most imporant factors in population dy (1).docx1- identify and discuss the two most imporant factors in population dy (1).docx
1- identify and discuss the two most imporant factors in population dy (1).docx
Nicholas3uGPooled
 
1- How does ancestry and race play into disease genetics- 2- How does.docx
1- How does ancestry and race play into disease genetics- 2- How does.docx1- How does ancestry and race play into disease genetics- 2- How does.docx
1- How does ancestry and race play into disease genetics- 2- How does.docx
Nicholas3uGPooled
 
1- Historical Development of Computing and Information Technology a) H.docx
1- Historical Development of Computing and Information Technology a) H.docx1- Historical Development of Computing and Information Technology a) H.docx
1- Historical Development of Computing and Information Technology a) H.docx
Nicholas3uGPooled
 
1- How has examining your beliefs- assumptions- and values related to.docx
1- How has examining your beliefs- assumptions- and values related to.docx1- How has examining your beliefs- assumptions- and values related to.docx
1- How has examining your beliefs- assumptions- and values related to.docx
Nicholas3uGPooled
 
1- Given the Trilemma- if a country has the free flow of capital and a.docx
1- Given the Trilemma- if a country has the free flow of capital and a.docx1- Given the Trilemma- if a country has the free flow of capital and a.docx
1- Given the Trilemma- if a country has the free flow of capital and a.docx
Nicholas3uGPooled
 
1- Give a definition of heteroscedasticity- 2- For what reasons does h.docx
1- Give a definition of heteroscedasticity- 2- For what reasons does h.docx1- Give a definition of heteroscedasticity- 2- For what reasons does h.docx
1- Give a definition of heteroscedasticity- 2- For what reasons does h.docx
Nicholas3uGPooled
 

More from Nicholas3uGPooled (20)

1- The following represent various stages of cell division (mitosis-me.docx
1- The following represent various stages of cell division (mitosis-me.docx1- The following represent various stages of cell division (mitosis-me.docx
1- The following represent various stages of cell division (mitosis-me.docx
 
1- In cats- again- black color is dominant to a special- temperature-s.docx
1- In cats- again- black color is dominant to a special- temperature-s.docx1- In cats- again- black color is dominant to a special- temperature-s.docx
1- In cats- again- black color is dominant to a special- temperature-s.docx
 
1- The ability of a virus to infect one type of organism and not anoth.docx
1- The ability of a virus to infect one type of organism and not anoth.docx1- The ability of a virus to infect one type of organism and not anoth.docx
1- The ability of a virus to infect one type of organism and not anoth.docx
 
1- The 3-part- multiple human brain refers to the A- brainstem- limbi.docx
1- The 3-part- multiple human brain refers to the  A- brainstem- limbi.docx1- The 3-part- multiple human brain refers to the  A- brainstem- limbi.docx
1- The 3-part- multiple human brain refers to the A- brainstem- limbi.docx
 
1- System in science- Types- Feedbacks 2- Nature of Physical Geography.docx
1- System in science- Types- Feedbacks 2- Nature of Physical Geography.docx1- System in science- Types- Feedbacks 2- Nature of Physical Geography.docx
1- System in science- Types- Feedbacks 2- Nature of Physical Geography.docx
 
1- T-F- Annual borius plans are long-term executive inctitives- and at.docx
1- T-F- Annual borius plans are long-term executive inctitives- and at.docx1- T-F- Annual borius plans are long-term executive inctitives- and at.docx
1- T-F- Annual borius plans are long-term executive inctitives- and at.docx
 
1- Select all that apply- Software testing is a process that helps in.docx
1- Select all that apply- Software testing is a process that helps in.docx1- Select all that apply- Software testing is a process that helps in.docx
1- Select all that apply- Software testing is a process that helps in.docx
 
1- Pandoravirus salinus is virus that infects amoeba- is very large (1.docx
1- Pandoravirus salinus is virus that infects amoeba- is very large (1.docx1- Pandoravirus salinus is virus that infects amoeba- is very large (1.docx
1- Pandoravirus salinus is virus that infects amoeba- is very large (1.docx
 
1- Joe Smith works in the IT department of a large industrial company-.docx
1- Joe Smith works in the IT department of a large industrial company-.docx1- Joe Smith works in the IT department of a large industrial company-.docx
1- Joe Smith works in the IT department of a large industrial company-.docx
 
1- In order to beat- the heart requires A- nervous system input B- h.docx
1- In order to beat- the heart requires  A- nervous system input  B- h.docx1- In order to beat- the heart requires  A- nervous system input  B- h.docx
1- In order to beat- the heart requires A- nervous system input B- h.docx
 
1- In terms of the environment of early earth- what resulted from the.docx
1- In terms of the environment of early earth- what resulted from the.docx1- In terms of the environment of early earth- what resulted from the.docx
1- In terms of the environment of early earth- what resulted from the.docx
 
1- Identify one job position to develop- compentency based job descrip.docx
1- Identify one job position to develop- compentency based job descrip.docx1- Identify one job position to develop- compentency based job descrip.docx
1- Identify one job position to develop- compentency based job descrip.docx
 
1- Implement a Python function that accepts an positive integer and re.docx
1- Implement a Python function that accepts an positive integer and re.docx1- Implement a Python function that accepts an positive integer and re.docx
1- Implement a Python function that accepts an positive integer and re.docx
 
1- How may have the complex lifestyle of digentic trematodes evolved-.docx
1- How may have the complex lifestyle of digentic trematodes evolved-.docx1- How may have the complex lifestyle of digentic trematodes evolved-.docx
1- How may have the complex lifestyle of digentic trematodes evolved-.docx
 
1- identify and discuss the two most imporant factors in population dy (1).docx
1- identify and discuss the two most imporant factors in population dy (1).docx1- identify and discuss the two most imporant factors in population dy (1).docx
1- identify and discuss the two most imporant factors in population dy (1).docx
 
1- How does ancestry and race play into disease genetics- 2- How does.docx
1- How does ancestry and race play into disease genetics- 2- How does.docx1- How does ancestry and race play into disease genetics- 2- How does.docx
1- How does ancestry and race play into disease genetics- 2- How does.docx
 
1- Historical Development of Computing and Information Technology a) H.docx
1- Historical Development of Computing and Information Technology a) H.docx1- Historical Development of Computing and Information Technology a) H.docx
1- Historical Development of Computing and Information Technology a) H.docx
 
1- How has examining your beliefs- assumptions- and values related to.docx
1- How has examining your beliefs- assumptions- and values related to.docx1- How has examining your beliefs- assumptions- and values related to.docx
1- How has examining your beliefs- assumptions- and values related to.docx
 
1- Given the Trilemma- if a country has the free flow of capital and a.docx
1- Given the Trilemma- if a country has the free flow of capital and a.docx1- Given the Trilemma- if a country has the free flow of capital and a.docx
1- Given the Trilemma- if a country has the free flow of capital and a.docx
 
1- Give a definition of heteroscedasticity- 2- For what reasons does h.docx
1- Give a definition of heteroscedasticity- 2- For what reasons does h.docx1- Give a definition of heteroscedasticity- 2- For what reasons does h.docx
1- Give a definition of heteroscedasticity- 2- For what reasons does h.docx
 

Recently uploaded

Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 

Recently uploaded (20)

Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 

1- Reflected and stored are types of XSS attacks- 2- An attack has occ.docx

  • 1. 1. Reflected and stored are types of XSS attacks. 2. An attack has occurred on your network. An attacker was able to traverse several files and folders, looking for sensitive data. What type of attack has occurred? 3. AH is the protocol within IPSec used for encryption services. 4. As network administrator, you are concerned with the plaintext transmission of sensitive data on the network. Which of the following protocols are used to help secure communications? (Select three.) A. IPSec . HITP 5. To increase network security, you have decided to use HTTPS on your shopping cart site. Which of the following ports does HTTPS use? A. 80 B. 53 C. 443 D. 51 6. _____and AH are used to secure IPSec transmissions. 7. CSRF attacks exploit the trust a Web site has in a user's Web browser. 8. Kerberos is a(n)___ protocol. 9. To increase overall communication security, you decide to implement 3DES encryption. Which of the following statements is true of 3DES? 10. You are concerned about a cross-site forgery attack. Which of the following can you do to help prevent such an attack? 11. To establish IPSec encryption, two hosts must create a shared key with each other before SA negotiations can take place.