An abstract image shows dark and bright shades glowing.

© Elena Kichigina/Shutterstock

APPENDIX A
Answer Key

CHAPTER 1 The Internet and the World Wide Web

1. B  2. A  3. C  4. D  5. A  6. C  7. D  8. C  9. C  10. C

CHAPTER 2 Security Considerations for SOHO and Personal Systems

1. C  2. A  3. B  4. D  5. B  6. A  7. B  8. C  9. B  10. B, C, and F

CHAPTER 3 Security Considerations for Business

1. A  2. D  3. C  4. B  5. A  6. D  7. B  8. C  9. A and B  10. C

CHAPTER 4 Mitigating Risk When Connecting to the Internet

1. A  2. A and B  3. 80  4. B  5. A  6. C  7. D  8. A  9. B  10. B

CHAPTER 5 Mitigating Website Risks, Threats, and Vulnerabilities

1. D  2. C  3. A  4. B  5. B  6. A  7. A  8. B  9. A  10. B

CHAPTER 6 Web Application Security

1. A  2. E  3. B  4. C and D  5. B  6. D  7. B  8. E  9. A  10. B , C, and D

CHAPTER 7 How Web Applications Work and Building a Secure Foundation

1. B  2. c  3. e  4. C  5. C  6. A  7. b  8. A  9. a  10. B  11. D

CHAPTER 8 Developing Secure Web Applications

1. A  2. A and C  3. SSL/TLS  4. AES  5. B and C  6. A  7. A  8. A  9. B and C  10. A 

CHAPTER 9 Mitigating Web Application Vulnerabilities

1. A  2. D  3. B  4. E  5. C  6. Elevation of privilege  7. A  8. Session replace  9. A and C  10. B  11. D  12. A

CHAPTER 10 Performing a Website Vulnerability and Security Assessment

1. B  2. C  3. mitigation  4. B and C  5. A  6. A  7. D  8. C  9. injection  10. B, C and E  12. A  13. plug-ins  14. D  15. B   16. A

CHAPTER 11 Maintaining Compliance for E-commerce Websites

1. C  2. D  3. B  4. B  5. A  6. A  7. B  8. D  9. A  10. A

CHAPTER 12 Testing and Quality Assurance for Websites

1. B  2. B  3. D  4. B  5. D  6. A  7. B  8. C  9. A  10. A

CHAPTER 13 Securing Mobile Communications

1. A  2. A  3. B  4. B  5. C  6. fixed wireless  7. D  8. B  9. C  10. B and C  11. A  12. A  13. D  14. B  15. B

CHAPTER 14 Securing Personal and Business Communications

1. Store-and-Forward  2. B  3. email  4. B  5. B  6. C  7. A  8. A  9. C  10. A  11. A  12. A

CHAPTER 15 Security Training, Education, and Certification

1. A  2. B  3. C  4. C  5. B  6. A  7. D  8. A  9. A  10. D

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.47.163