Copyright
Computer Science 202: Network and System Security  /  Computer Science Courses

Test Prep Plan - Take a practice test

Take this practice test to check your existing knowledge of the course material. We'll review your answers and create a Test Prep Plan for you based on your results.
How Test Prep Plans work
1
Answer 50 questions
Test your existing knowledge.
2
View your test results
Based on your results, we'll create a customized Test Prep Plan just for you!
3
Study smarter
Study more effectively: skip concepts you already know and focus on what you still need to learn.

Web Application Security Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. From what port does FTP server send data and information?

Question 2 2. What is S-FTP?

Question 3 3. Service-oriented architecture does not make use of 3GLs and 4GLs because _____.

Question 4 4. Service-oriented architecture describes _____.

Question 5 5. Telnet was created for what computer network?

Page 2

Question 6 6. Why is encryption so important for SSH?

Question 7 7. Which of these is considered a decreased measurable?

Question 8 8. How will a consumer notice malware at the end of the billing cycle?

Question 9 9.

Choose the correct set of words to fill in the blanks:

_____ are used to describe _____ for displaying text, graphics, and user inputs in an HTML document.

Question 10 10. Which programming tool was developed in 1993 and became the standard for the Internet ?

Page 3

Question 11 11. SMTP server A initiates communication with SMTP server B. SMTP server B responds with a _____

Question 12 12. The _____ mail command starts the process of sending sequential lines of texts with the message

Question 13 13. Which type of computer attack is considered a distributed attack?

Question 14 14. Which of these options contains a primary objective of a DoS or DDoS attack?

Question 15 15. What does HTTP stand for?

Page 4

Question 16 16. What is included in HTTP?

Question 17 17. The transport layer performs error checking, data packet creation and what other types of services?

Question 18 18. Which two computers facilitate multiplexing and demultiplexing?

Question 19 19. Information is broken down into _____ to move across the Internet.

Question 20 20. Servers, routers, cellphone towers and satellites are _____ on the network that pass information along to its final destination.

Page 5

Question 21 21. What is IMAP?

Question 22 22. The secure logical connection to which IMAP is bound to connect to the internet is _____

Question 23 23. One of the other protocols that works along with POP is SMTP, which stands for:

Question 24 24. The OSI Model is used to:

Question 25 25. Which of these best describes encryption?

Page 6

Question 26 26. Which of these is an example of a strong password?

Question 27 27. What port does a sever listen to for FTP requests?

Question 28 28. Client-Server architecture defines the network of components in which _____.

Question 29 29. The use of SSH to share files is known as _____.

Question 30 30. Which of the following is true about mobile malware?

Web Application Security Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Support