Chapter 1 From Mainframe to Client/Server to World Wide Web
B
C
B and C
A
C
C
B
Blind patching
Cloud computing
B
B
Chapter 2 From Brick-and-Mortar to E-commerce to E-business Transformation
A
A, B, and D
A, B, and D
A and D
B and C
C
A
Limited two-way communication
B
A
Chapter 3 Evolution of People-to-People Communications
A
A
A and D
A and B
A
A and C
Social networking
A
Unified messaging
A, C, and D
Chapter 4 From Personal Communication to Social Networking
B
A and B
A
C
B
Eye tracking or eye pathing
A
Chunking
Phishing
B and C
A
Chapter 5 Mitigating Risk When Connecting to the Internet
A
A and B
B
C
A
Intrusion detection system or IDS
A
80
Proxy server
B
A
Chapter 6 Mitigating Web Site Risks, Threats, and Vulnerabilities
A
A
B
A, C, and D
C
Encapsulating Security Payload or ESP
A
Authentication
A
B
B
Chapter 7 Introducing the Web Application Security Consortium (WASC)
A
E
XSS attacks exploit the trust that a user has in a site, while CSRF attacks exploit the trust a Web site has in the user's browser.
C and D
A
A, B, and C
SQL injection
A and D
B, C, and E
A
B, C, and D
C
Chapter 8 Securing Web Applications
A
B
A
B and C
C
Secure Sockets Layer or SSL
Advanced Encryption Standard (AES)
D
B and C
A
A
B
Chapter 9 Mitigating Web Application Vulnerabilities
A
A, B, and D
B
E
C
Elevation of privilege
A
Session replay
B and C
B
D
A
Chapter 10 Maintaining PCI DSS Compliance for E-commerce Web Sites
B
A, C, and D
B
A and B
Batch processing
A
Real-time processing
C
B, C, and D
A
Chapter 11 Testing and Quality Assurance for Production Web Sites
A
A and D
A
A
C
Gray box testing
A
A, B, and C
C
B
Chapter 12 Performing a Web Site Vulnerability and Security Assessment
B
C
Remediation
B and C
B
A
D
C
Injection
B, C, and E
C
A
Plug-ins
D
B
Chapter 13 Securing Endpoint Device Communications
C and D
B
C
Multimedia Messaging Service or MMS
B
A
B
Eavesdropping
D
B
B
Convergence
B and C
A
A
Chapter 14 Securing Personal and Business Communications
Store-and-forward
B
B
E
A and B
B and D
B and C
B
C
A and B
Virtual local area networks or VLANs
D
A
C
Chapter 15 Web Application Security Organizations, Education, Training, and Certification
C
B and C
A and C
B, C, and E
A
D
A
B
D
B
18.116.63.236