1. Reflected and stored are types of XSS attacks. 2. An attack has occurred on your network. An attacker was able to traverse several files and folders, looking for sensitive data. What type of attack has occurred? 3. AH is the protocol within IPSec used for encryption services. 4. As network administrator, you are concerned with the plaintext transmission of sensitive data on the network. Which of the following protocols are used to help secure communications? (Select three.) A. IPSec . HITP 5. To increase network security, you have decided to use HTTPS on your shopping cart site. Which of the following ports does HTTPS use? A. 80 B. 53 C. 443 D. 51 6. _____and AH are used to secure IPSec transmissions. 7. CSRF attacks exploit the trust a Web site has in a user's Web browser. 8. Kerberos is a(n)___ protocol. 9. To increase overall communication security, you decide to implement 3DES encryption. Which of the following statements is true of 3DES? 10. You are concerned about a cross-site forgery attack. Which of the following can you do to help prevent such an attack? 11. To establish IPSec encryption, two hosts must create a shared key with each other before SA negotiations can take place. .