MCQs > IT & Programming > Internet Security MCQs > Basic Internet Security MCQs

Basic Internet Security MCQ

1. The icmp packet field____ provides error detection for the icmp header only.

Answer

Correct Answer: Checksum

Note: This Question is unanswered, help us to find answer for this one

2. Telnet protocol packets usually go to tcp port ____.

Answer

Correct Answer: 23

Note: This Question is unanswered, help us to find answer for this one

3. With _____, phone calls are treated as just another kind of data.

Answer

Correct Answer: Voice over IP

Note: This Question is unanswered, help us to find answer for this one

4. Strong security is needed to ________.

Answer

Correct Answer: Reconfigure remote switches

Note: This Question is unanswered, help us to find answer for this one

5. The ____ was established to secure and monitor security risks to u.s. networks and the internet.

Answer

Correct Answer: US-CERT

Note: This Question is unanswered, help us to find answer for this one

6. In most us states, consent is required for _______ recording but not for ________ recording.

Answer

Correct Answer: Voice/video

Note: This Question is unanswered, help us to find answer for this one

7. A(n) ________ uses the internet to create a secure network connection.

Answer

Correct Answer: Virtual Private Network (VPN)

Note: This Question is unanswered, help us to find answer for this one

8. A ________ can be used to gather network information or user data.

Answer

Correct Answer: Packet sniffer

Note: This Question is unanswered, help us to find answer for this one

9. ____ are one method to control websites that can track your content on the internet.

Answer

Correct Answer: TPLs

Note: This Question is unanswered, help us to find answer for this one

10. Which of the following are Virus propagation techniques?

Answer

Correct Answer: Master Boot Record

Note: This Question is unanswered, help us to find answer for this one

11.

Select the drawbacks of Symmetric key cryptography.

Answer

Correct Answer: It can't implement non-repudiation
It is less secure

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

12.

Which of the following are  Transport Layer Security protocols?

Answer

Correct Answer: SSL
SOCKS

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

13.

Which of the following authentication protocols are used to encrypt passwords?

Answer

Correct Answer: CHAP
ARAP

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

14.

What are the features of an IPS?

Answer

Correct Answer: Fault Tolerance.
Minimal Overhead.
Timely Alerting Mechanism.
Anomaly based.

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

15.

Which of the following are the components of PKI?

Answer

Correct Answer: Certificate Authority.
Organizational Registration Authorities
Certificate Holders
Clients that validate digital signatures.

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

16.

Which of the following technique is used to approach security in ActiveX?

Answer

Correct Answer: Digital Sign

Note: This Question is unanswered, help us to find answer for this one

17.

Which of the following are the components of a UTM appliance?

Answer

Correct Answer: Firewall
Gateway Antispam
Gateway Antivirus
IDS/IPS

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

18.

Which of the following are the placement modes of an IDS/IPS?

Answer

Correct Answer: Inline
Tap
SPAN

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

19.

Which of the following is Application-level security protocol are used for communications session security?

Answer

Correct Answer: Both A and B

Note: This Question is unanswered, help us to find answer for this one

20.

Which of the following statement shows the breach of Integrity:

Answer

Correct Answer: Important data deleted from a document.

Note: This Question is unanswered, help us to find answer for this one

21.

Which of the following Symmetric algorithms has variable key length?

Answer

Correct Answer: Rivest Cipher 4

Note: This Question is unanswered, help us to find answer for this one

22.

A positive detection of result that is false or untrue is called

Answer

Correct Answer: False Positive

Note: This Question is unanswered, help us to find answer for this one

23.

Which of the following can be classified as code and cryptographic attacks?

Answer

Correct Answer: Viruses
Worms
Trojans

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

24.

Which protocol is used by RADIUS?

Answer

Correct Answer: UDP

Note: This Question is unanswered, help us to find answer for this one

25.

Which type of authentication is.”Something the user has ” ?

Answer

Correct Answer: Dual Factor

Note: This Question is unanswered, help us to find answer for this one

26.

Which port does IKE key negotiation protocol use?

Answer

Correct Answer: UDP 500

Note: This Question is unanswered, help us to find answer for this one

27.

In which of the following attacks, sending a large number of spoofed ICMP ECHO requests to broadcast address?

Answer

Correct Answer: SMURF attack

Note: This Question is unanswered, help us to find answer for this one

28.

In which of the following Buffer Overflow help us to find weaknesses?

Answer

Correct Answer: Software

Note: This Question is unanswered, help us to find answer for this one

29.

What is a UTM appliance?

Answer

Correct Answer: Unified Threat Management.

Note: This Question is unanswered, help us to find answer for this one

30.

Joe wants to secure his client’s Web Server. Which of the following measures will he take?

Answer

Correct Answer: Managing Access Control
Eliminating Scripting Vulnerabilities
Maintaining Integrity.
Blocking Browser Exploits.

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

31.

Which of the following can be transmitted through an E-mail?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

32.

What is S/MIME?

Answer

Correct Answer: Secure Multipurpose Internet Mail Extensions

Note: This Question is unanswered, help us to find answer for this one

33.

Which of the following is created to serve as a snare for intruders?

Answer

Correct Answer: Honey Pots.

Note: This Question is unanswered, help us to find answer for this one

34.

Which of the following are the key principles of Internet Security?

Answer

Correct Answer: Confidentiality, Integrity, Availability

Note: This Question is unanswered, help us to find answer for this one

35.

What is RSA in cryptography?

Answer

Correct Answer: Rivest, Shamir, Adleman

Note: This Question is unanswered, help us to find answer for this one

36.

What does RBL contain?

Answer

Correct Answer: IP addresses of open relay mail servers

Note: This Question is unanswered, help us to find answer for this one

37.

Which of the following techniques is used to approach security in Java?

Answer

Correct Answer: Sandboxing

Note: This Question is unanswered, help us to find answer for this one

38.

What is RBL in E-mail Security?

Answer

Correct Answer: Realtime Blackhole List

Note: This Question is unanswered, help us to find answer for this one

39.

Which of the following keys helps us in the verification of the Digital Signature?

Answer

Correct Answer: Public Key

Note: This Question is unanswered, help us to find answer for this one

40.

How many keys are required if two parties communicate using Symmetric cryptography?

Answer

Correct Answer: One

Note: This Question is unanswered, help us to find answer for this one

41.

The concept of allowing access to resources only to those permitted is known as

Answer

Correct Answer: Authorization

Note: This Question is unanswered, help us to find answer for this one

42.

By which of the following methods can social engineering be curbed by?

Answer

Correct Answer: User Education

Note: This Question is unanswered, help us to find answer for this one

43.

Which of the following protocols does not help in securing the FTP?

Answer

Correct Answer: SSFTP

Note: This Question is unanswered, help us to find answer for this one

44.

The part of a company’s intranet which is extended to users outside the company is called:

Answer

Correct Answer: Extranet

Note: This Question is unanswered, help us to find answer for this one

45.

Which protocol is used to secure the WAP communication?

Answer

Correct Answer: Wireless Transport Layer Security

Note: This Question is unanswered, help us to find answer for this one

46.

Mike wants to secure the data on his personal computer. Which of the following options will he choose to secure the data?

Answer

Correct Answer: Encryption

Note: This Question is unanswered, help us to find answer for this one

47.

By which of the following can the injection of bogus routes into the core network be prevented ?

Answer

Correct Answer: Route Authentication

Note: This Question is unanswered, help us to find answer for this one

48.

Which of the following detect/s security weaknesses in a remote or local host?

Answer

Correct Answer: Scanner

Note: This Question is unanswered, help us to find answer for this one

49.

Which of the following statements is true of Tunneling?

Answer

Correct Answer: Contents of the protocol are encapsulated.

Note: This Question is unanswered, help us to find answer for this one

50.

A Brute Force attack

Answer

Correct Answer: discovers the passwords.

Note: This Question is unanswered, help us to find answer for this one

51.

The process of switching protocols between routing devices is called

Answer

Correct Answer: Protocol Switching

Note: This Question is unanswered, help us to find answer for this one

52.

What is function of IPS?

Answer

Correct Answer: A device to block intrusion attacks

Note: This Question is unanswered, help us to find answer for this one

53.

A criminal who breaks into computers maliciously is known as

Answer

Correct Answer: Black Hat Hacker.

Note: This Question is unanswered, help us to find answer for this one

54.

Below are the given statements, which statement shows the breach of Availability:

Answer

Correct Answer: SYN attack on a server.

Note: This Question is unanswered, help us to find answer for this one

55.

Which port is used by PPTP?

Answer

Correct Answer: 1723

Note: This Question is unanswered, help us to find answer for this one

56.

Which of the following statements resembles Trojan horses?

Answer

Correct Answer: Installation of Backdoor Programs.

Note: This Question is unanswered, help us to find answer for this one

57.

Which key is used to decrypt the message in PKI?

Answer

Correct Answer: Private Key

Note: This Question is unanswered, help us to find answer for this one

58.

Which protocol is used by TACACS+?

Answer

Correct Answer: TCP

Note: This Question is unanswered, help us to find answer for this one

59.

What is the key length of Triple DES?

 

Answer

Correct Answer: 168

Note: This Question is unanswered, help us to find answer for this one

60.

Which of the following helps us to block attacks on a single machine?

Answer

Correct Answer: Host Based IPS

Note: This Question is unanswered, help us to find answer for this one

61.

Which of the following is an Asymmetric algorithm?

Answer

Correct Answer: El Gamal

Note: This Question is unanswered, help us to find answer for this one

62.

In which of the following protocols does an SYN attack help to find a weakness?

Answer

Correct Answer: TCP/IP

Note: This Question is unanswered, help us to find answer for this one

63.

In how many phases is a IPSec VPN connection completed while making a VPN connection with a Security product?

Answer

Correct Answer: 2

Note: This Question is unanswered, help us to find answer for this one

64.

Which of the following is an application attack?

Answer

Correct Answer: Buffer Overflow

Note: This Question is unanswered, help us to find answer for this one

65.

Which of the following is the standard certificate?

Answer

Correct Answer: X.509

Note: This Question is unanswered, help us to find answer for this one

66.

Which of the following Asymmetric encryption algorithms is supported by S/MIME?

Answer

Correct Answer: RSA

Note: This Question is unanswered, help us to find answer for this one

67.

By which of the following third parties are Digital Certificates signed?

Answer

Correct Answer: Certificate Authority

Note: This Question is unanswered, help us to find answer for this one

68.

Which protocol helps in securing LDAP?

Answer

Correct Answer: SSL/TLS

Note: This Question is unanswered, help us to find answer for this one

69.

Allen wants to sign a message which he is sending to Mark. Which key will Allen use to sign the message?

Answer

Correct Answer: Allen’s Private key.

Note: This Question is unanswered, help us to find answer for this one

70.

The ability to exploit a vulnerability is called:

Answer

Correct Answer: Threat

Note: This Question is unanswered, help us to find answer for this one

71.

Which of the following goals cannot be achieved with Symmetric cryptography?

Answer

Correct Answer: Non-repudiation

Note: This Question is unanswered, help us to find answer for this one

72.

Which of the following protocols uses UDP:

Answer

Correct Answer: DNS
TFTP

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

73.

Select the objectives of E-mail security.

Answer

Correct Answer: Verifying the source of a message.
Classifying attachments.
Message integrity.

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

74.

Which of the following appliances help/s in filtering virus packets?

Answer

Correct Answer: Antivirus Engines
UTM

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

75.

Which of the following are the components of IPSec?

Answer

Correct Answer: Authentication Header.
Encapsulating Security Payload.

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

76.

Which of the following methods can be used for Network hardening?

Answer

Correct Answer: Evaluating IDS
Refining ACLs on routers and switches.
Up-to-date OS and patches of Network devices.

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

77.

Which of the following measures are taken to enhance the security of the system? (Select all that apply)

Answer

Correct Answer: Operating System based hardening
Network Based hardening
Application Based hardening
Timely Refining of Security Policies

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

78.

Which of the following are Vulnerability assessment tools?

Answer

Correct Answer: Nmap
Nessus

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

79.

Select the common VPN protocols.

Answer

Correct Answer: L2TP
PPTP

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

80.

Which of the following can be classified as passive attacks?

Answer

Correct Answer: Vulnerability scans.
Sniffing.

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

81.

Which of the following are Email Security protocols?

Answer

Correct Answer: S/MIME
PEM

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

82.

Which of the following Symmetric encryption algorithms is/are supported by S/MIME?

Answer

Correct Answer: DES
3DES

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

83.

Which of the following things should be kept in mind while managing passwords?

Answer

Correct Answer: Easily guessed passwords should not be used.
Passwords should not be stored on a plain view.
Passwords should be changed once a month.

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

84.

Which of the following are the advantages of Honeypots?

Answer

Correct Answer: Intelligent IDS
Distracts Hackers

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

85.

Which of the following are signs of Security breach?

Answer

Correct Answer: Data modification and deletion.
System performance issues.
Different traffic patterns.
Large number of failed log in attempts.

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

86.

Which of the below listed are included in Application hardening?

Answer

Correct Answer: DNS server
Mail Server
Web Server

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

87. Which of the following is a standalone computer program that pretends to be a well-known program in order to steal confidential data ?

Answer

Correct Answer: Fraudtool

Note: This Question is unanswered, help us to find answer for this one

88. All of the following are valid cryptographic hash functions EXCEPT:

Answer

Correct Answer: RC4

Note: This Question is unanswered, help us to find answer for this one

89. In the sublayer of which of the following does TLS and SSL performs the data encryption of network connections?

Answer

Correct Answer: application layer

Note: This Question is unanswered, help us to find answer for this one

90. Which of the following are the public keys of asymmetric key pairs that are used to encrypt keys using a public key algorithm ?

Answer

Correct Answer: Private key transport key

Note: This Question is unanswered, help us to find answer for this one

91. Which of the following is not a VALID type of firewall?

Answer

Correct Answer: Proxy Server Gateways

Note: This Question is unanswered, help us to find answer for this one

92. Which of the following HTTP method is considered insecure ?

Answer

Correct Answer: TRACE

Note: This Question is unanswered, help us to find answer for this one

93. What does the Linux kernal use to sandbox running programs?

Answer

Correct Answer: seccomp, or Secure Computing Mode

Note: This Question is unanswered, help us to find answer for this one

94. Which of the following are the public keys of asymmetric (public) key pairs that are used to encrypt keys using a public key algorithm?

Answer

Correct Answer: Public key transport key

Note: This Question is unanswered, help us to find answer for this one

95. Which of the following keys are used to encrypt other keys using symmetric key algorithms ?

Answer

Correct Answer: Symmetric key wrapping key

Note: This Question is unanswered, help us to find answer for this one

96. Which of the following is a VALID ephemeral key?

Answer

Correct Answer: Public ephemeral key agreement key

Note: This Question is unanswered, help us to find answer for this one

97. What is the less secure AES encryption mode?

Answer

Correct Answer: CBC

Note: This Question is unanswered, help us to find answer for this one

98. Which of the following represents a cryptographic key that is intended to be used for a long period of time?

Answer

Correct Answer: Private static key agreement key

Note: This Question is unanswered, help us to find answer for this one

99. Which of the following keys are the private keys of asymmetric (public) key pairs that are used only once to establish one or more keys ?

Answer

Correct Answer: Private ephemeral key agreement key

Note: This Question is unanswered, help us to find answer for this one

100. Which of the following represents a cryptographic key that is generated for each execution of a key establishment process ?

Answer

Correct Answer: Private ephemeral key agreement key

Note: This Question is unanswered, help us to find answer for this one

101. Which of the following is a VALID digital signature key?

Answer

Correct Answer: Private signature key

Note: This Question is unanswered, help us to find answer for this one

102. What is a method to fend off a Sockstress attack?

Answer

Correct Answer: White-listing access to TCP services on critical systems.

Note: This Question is unanswered, help us to find answer for this one

103. What does a cryptographic key do within the Internet Layer?

Answer

Correct Answer: It specifies how transferred information is converted into cyphertext.

Note: This Question is unanswered, help us to find answer for this one

104. What are the two primary classifications of cross-site scripting?

Answer

Correct Answer: non-persistent and persistent.

Note: This Question is unanswered, help us to find answer for this one

105. Which of the following is a VALID authorization key?

Answer

Correct Answer: Public authorization key

Note: This Question is unanswered, help us to find answer for this one

106. How can cookies be used to mitigate cross-site scripting?

Answer

Correct Answer: Cookies allow for cookie-based user authentication.

Note: This Question is unanswered, help us to find answer for this one

107. Which version of TLS is vulnerable to BEAST exploit?

Answer

Correct Answer: TLS 1.0

Note: This Question is unanswered, help us to find answer for this one

108. Which of the following threats corresponds with an attacker targeting specific employees of a company?

Answer

Correct Answer: Spear phishing

Note: This Question is unanswered, help us to find answer for this one

109. Secure Sockets Layer is a predecessor of which cryptographic protocol?

Answer

Correct Answer: Transport Layer Security

Note: This Question is unanswered, help us to find answer for this one

110. When is encrypted data the safest?

Answer

Correct Answer: When it is at rest.

Note: This Question is unanswered, help us to find answer for this one

111. How are port numbers categorized?

Answer

Correct Answer: Well-known, registered, and static/dynamic.

Note: This Question is unanswered, help us to find answer for this one

112. Why is a virtual machine considered a sandboxing method?

Answer

Correct Answer: All host resources are channeled through the emulator.

Note: This Question is unanswered, help us to find answer for this one

113. Which of the following is a valid flaw of SSL 2.0 ?

Answer

Correct Answer: All of the given options are correct

Note: This Question is unanswered, help us to find answer for this one

114. If you set up a BUS network, what is the major disadvantage?

Answer

Correct Answer: It is linked with a single cable which can be a major vulnerability.

Note: This Question is unanswered, help us to find answer for this one

115. Which of the following is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management Infrastructure (PMI)?

Answer

Correct Answer: X.509

Note: This Question is unanswered, help us to find answer for this one

116. An SQL injection is often used to attack what?

Answer

Correct Answer: Large-scale SQL databases such as those containing credit card information.

Note: This Question is unanswered, help us to find answer for this one

117. Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer?

Answer

Correct Answer: Trojan Horse

Note: This Question is unanswered, help us to find answer for this one

118. Which of the following is true about Public Key Encryption?

Answer

Correct Answer: Anyone can encrypt with the public key, only one person can decrypt with the private key

Note: This Question is unanswered, help us to find answer for this one

119. What does the acronym BEAST mean in Beast Attack?

Answer

Correct Answer: Browser Exploit Against SSL/TLS

Note: This Question is unanswered, help us to find answer for this one

120. What is another name for Internet Layer?

Answer

Correct Answer: IP layer

Note: This Question is unanswered, help us to find answer for this one

121. Who was TLS defined by?

Answer

Correct Answer: Internet Engineering Task Force

Note: This Question is unanswered, help us to find answer for this one

122. Which of the following is collection of Internet-connected programs communicating with other similar programs in order to perform tasks?

Answer

Correct Answer: Botnet

Note: This Question is unanswered, help us to find answer for this one

123. What does cross-site scripting allow for attackers?

Answer

Correct Answer: Injection of client-side scripts into web pages.

Note: This Question is unanswered, help us to find answer for this one

124. What is network topology?

Answer

Correct Answer: It is the framework of the components of a computer network.

Note: This Question is unanswered, help us to find answer for this one

125. Is a Unix-based system vulnerable to viruses?

Answer

Correct Answer: Yes, however the majority are coded to attack Windows-based systems.

Note: This Question is unanswered, help us to find answer for this one

126. If cookies with non-random sequence numbers are issued upon authentication, which of the following attack types can occur?

Answer

Correct Answer: Session hijacking

Note: This Question is unanswered, help us to find answer for this one

127. Which of the following is a VALID type of Key Management System?

Answer

Correct Answer: Both Integrated Key Management System and Third-Party Key Management System

Note: This Question is unanswered, help us to find answer for this one

128. There are two types of firewall. What are they?

Answer

Correct Answer: Hardware and software.

Note: This Question is unanswered, help us to find answer for this one

129. What two main categories of network topologies are there?

Answer

Correct Answer: Physical and logical.

Note: This Question is unanswered, help us to find answer for this one

130. Which of the following is TRUE about SSL 3.0?

Answer

Correct Answer: SSL 3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for certificate authentication

Note: This Question is unanswered, help us to find answer for this one

131. Which of the following is TRUE about TLS?

Answer

Correct Answer: All of the given options are correct

Note: This Question is unanswered, help us to find answer for this one

132. Can a proxy be used as a firewall? If so, how?

Answer

Correct Answer: Yes. A proxy acts as a network intermediary for the user that serves to control the flow of incomming and outgoing traffic.

Note: This Question is unanswered, help us to find answer for this one

133. Which of the following are the basic functionalities of the IPsec Protocol ?

Answer

Correct Answer: All of the given options are correct

Note: This Question is unanswered, help us to find answer for this one

134. Why is it crucial to encrypt data in transit?

Answer

Correct Answer: To prevent unauthorized access to private networks and sensitive information during its most vulnerable state.

Note: This Question is unanswered, help us to find answer for this one

135. Which is the best way a system can be hardened?

Answer

Correct Answer: Total disk encryption coupled with strong network security protocols.

Note: This Question is unanswered, help us to find answer for this one

136. Which of the following symmetric keys can be derived from Symmetric master key?

Answer

Correct Answer: All of the given options are correct

Note: This Question is unanswered, help us to find answer for this one

137. Which of the following are valid Cryptographic key types?

Answer

Correct Answer: All of the given options are correct

Note: This Question is unanswered, help us to find answer for this one

138. What happens during the TCP attack; Denial of Service?

Answer

Correct Answer: Information is repeatedly sent to the victim to consume their system resources, causing them to shut down.

Note: This Question is unanswered, help us to find answer for this one

139. How to avoid Man-in-the-middle attacks?

Answer

Correct Answer: Use HTTPS connections and verify the SSL certificate

Note: This Question is unanswered, help us to find answer for this one

140. What does TCP mean?

Answer

Correct Answer: Transmission Control Protocol

Note: This Question is unanswered, help us to find answer for this one

141. Which of the following are possible security threats?

Answer

Correct Answer: All of the given options are correct

Note: This Question is unanswered, help us to find answer for this one

142. Digital signatures provide which of the following ?

Answer

Correct Answer: All of the given options are correct

Note: This Question is unanswered, help us to find answer for this one

143. Is true that HTTP is an insecure protocol?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

144. When cookies are used as session identifiers, how are they then used as a potential security hazard?

Answer

Correct Answer: Attackers emulate users by stealing their cookies.

Note: This Question is unanswered, help us to find answer for this one

145. What does IP mean?

Answer

Correct Answer: Internet Protocol

Note: This Question is unanswered, help us to find answer for this one