Module 8 final exam
Question 1 (1 point) Question 1 Unsaved
What protocol should be used when transferring confidential
data in a Web application?
Question 1 options:
Question 2 (1 point) Question 2 Unsaved
An online merchant that experiences a security breach and
found not to be in compliance with PCI DSS can:
Question 2 options:
all of the above.
suffer monetary loss.
lose their reputation.
have lawsuits directed against them.
Question 3 (1 point) Question 3 Unsaved
What does XSS exploit in a Web application?
Question 3 options:
Invalidated user input
Question 4 (1 point) Question 4 Unsaved
What is the first step when performing a Web site security
Question 4 options:
Identify the components that make up the Web site.
Perform penetration testing to discover vulnerabilities.
Test forms for input validation.
Attempt to escalate privileges on the Web site.
Question 5 (1 point) Question 5 Unsaved
When using an endpoint device, for which type of
communication do you need to install software to encrypt communications?
Question 5 options:
Question 6 (1 point) Question 6 Unsaved
An extension of SMS that allows a user to send and receive
multimedia is called __________.
Question 6 options:
Question 7 (1 point) Question 7 Unsaved
Which Web technology allows a Web application’s logged-on
users to use the application continuously without having to log in each time a
page is refreshed?
Question 7 options:
Elevation of privileges
Question 8 (1 point) Question 8 Unsaved
The central router or switching device for handling
telephone traffic is referred to as __________.
Question 8 options:
Question 9 (1 point) Question 9 Unsaved
Which of the following merchant levels must scan the
networks at least quarterly to be in compliance with PCI DSS?
Question 9 options:
Level 3 (20,000 to 1 million transactions a year)
Level 2 (1 million to 6 million transactions a year)
All merchants, no matter the size, must scan at least
Level 1 (more than 6 million transactions a year)
Question 10 (1 point) Question 10 Unsaved
Which of the following is not considered a best practice for
improving the security of a mobile device?
Question 10 options:
Install or enable a firewall.
Ensure the browser supports SSL.
Install or enable anti-malware functionality.
Disable the encryption feature.
Previous PageNext Page
Question 11 (1 point) Question 11 Unsaved
Which of the following can help you pinpoint problems with
an e-commerce site?
Question 11 options:
All of the above
Shopping cart abandonment statistics
Question 12 (1 point) Question 12 Unsaved
An e-commerce Web site that processes credit cards must
Question 12 options:
World Wide Web consortium standards
Question 13 (1 point) Question 13 Unsaved
You are designing a Web site that showcases and sells fine
jewelry. Which of the following will be the most useful to your visitors?
Question 13 options:
A call to action
A link to the About Us tab
A benefits statement
Question 14 (1 point) Question 14 Unsaved
What is a markup language that uses code for formatting a
Web site within a text file?
Question 14 options:
Question 15 (1 point) Question 15 Unsaved
After deploying a Web site application in a production
environment, which of the following requires the quickest response time by
Question 15 options:
Responding to a security breach
Responding to user feedback regarding a usability suggestion
Responding to intermittent error messages about a resource
Question 16 (1 point) Question 16 Unsaved
Consider a person who logs into a Web site with a username
and password. Which process allows the user access based upon correct
Question 16 options:
Question 17 (1 point) Question 17 Unsaved
What is the secure version of Hypertext Transfer Protocol?
Question 17 options:
Question 18 (1 point) Question 18 Unsaved
Which of the following is not an example of
Question 18 options:
A message on Facebook
Question 19 (1 point) Question 19 Unsaved
What is generally not a best practice for implementing VoIP?
Question 19 options:
Patch systems and keep antivirus software up to date.
Use VLANs to protect and prioritize VoIP traffic.
Do not use VPNs.
Segregate traffic from data network.
Question 20 (1 point) Question 20 Unsaved
Which of the following is a best practice for performing a
security assessment and vulnerability scan?
Question 20 options:
Ensuring that system administrators are unaware of the
Using multiple tools for the same function.
Hiring a black-hat hacker to perform the planned attacks.
Ignoring authenticated testing and relying on
Question 21 (1 point) Question 21 Unsaved
Which of the following techniques is recommended for VoIP
traffic to avoid attacks on the data network?
Question 21 options:
Use an IDS.
Purchase a different domain name for the IP address use.
Disallow network traffic from the firewall.
Question 22 (1 point) Question 22 Unsaved
Which phase of a Web security assessment involves conducting
fingerprinting to help identify the components of the Web site platform?
Question 22 options:
Question 23 (1 point) Question 23 Unsaved
Which of the following statements best describes bounce
Question 23 options:
The rate of single-page visits to the Web site
The rate of users who reload the Web page
The rate of users who have server reset timeouts
The rate of users who have experienced an error message
Question 24 (1 point) Question 24 Unsaved
During which aspect of a multimedia connection does SIP
discover and detect the user to be reached?
Question 24 options:
Question 25 (1 point) Question 25 Unsaved
Which of the following is not one of the twelve requirements
for PCI DSS compliance?
Question 25 options:
Regularly test security systems and processes.
Maintain a policy that addresses security for employees and
Track and monitor all access to network resources and
Never store any of the cardholder’s information in a
database or other storage mechanism.
Question 26 (1 point) Question 26 Unsaved
Your company is preparing to launch an SQL database with a
custom front-end interface. You are working with the development team on
protection strategies. Of the following, which is the best choice for
protecting your new SQL database and its contents?
Question 26 options:
Allow only administrative accounts to access the database.
Duplicate data within the database for redundancy purposes.
Use input validation.
Use many different and detailed error messages so that users
can be exact when reporting problems to tech support.
Question 27 (1 point) Question 27 Unsaved
How are dynamic Web applications that accept user input
susceptible to insecure coding practices?
Question 27 options:
Developers can fail to properly validate input on the client
User data can be authenticated but not validated.
Encrypted user connections expose programming security
Developers can fail to properly validate data on the server
Question 28 (1 point) Question 28 Unsaved
Consider a person who logs into a Web site with a username
and password. Which process tracks mechanisms used to keep a record of events
on the system?
Question 28 options:
Question 29 (1 point) Question 29 Unsaved
What is the primary purpose of the headline on a Web page?
Question 29 options:
To attract visitorsâ attention and entice them to keep
To tell your visitors what to do on your Web site
To ensure a higher SEO ranking
To show how your product or service solves an immediate
Question 30 (1 point) Question 30 Unsaved
You suspect that visitors are having difficulties navigating
your Web site. Which Web site analytic statistic can help you determine if this
Question 30 options:
Shopping cart abandonment
Previous PageNext Page
Our Service Charter
Excellent Quality / 100% Plagiarism-FreeWe employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers.
Free RevisionsWe keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed.
Confidentiality / 100% No DisclosureWe make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service.
Money Back GuaranteeIf the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit.
24/7 Customer SupportWe have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.