Boston University - MET - marcusgoncalves.com) is

advertisement
Boston University - MET
AD660 Mid-term 1
marcusg@marcusgoncalves.com or marcusg@bu.edu
Your Name
E-mail address
Notes:
1. Be brief.
2. The answers you submit should be the result of your own individual work. This should
not be a collaborative activity.
3. Refer to the course syllabus under “Exam Schedule and Conflict” for important notes regarding taking this exams and making up for it. Reminder, as stated in syllabus: There
will be NO make-up exams for any one exam.
----------------------------------Do not write below this line--------------------------------------This Exam Covers Lectures on Ecommerce/epay and Web/Internet Security and Policies
and HTML (Ch1-6)
Grade out of 100 =
Instructor’s Signature: ___________________________________
HTML, Dynamic Databases and Security, AD660 - Boston University, M. Goncalves, Spring 2013
1
1. What is the major cause of Internet security breach?
a. Hackers
b. Intruders
c. Employees
d. Interns
e. None of the above
2. List at least three of the main threats to security found on the Internet/web.
3. List and explain three major motivations for threat of security over the Internet/Web.
4. When planning Internet/Web security, what are the four phases of the project?
5. What is a Neutrality curve? Explain.
6. How does the Possibility curve relate to the Neutrality curve?
HTML, Dynamic Databases and Security, AD660 - Boston University, M. Goncalves, Spring 2013
2
7. What steps are necessary so that the Degree of Security can be understood? Please explain.
8. How does the Sensitive Segment works in the security assessment curves?
9. What are the main requisites for when adding services to your web infrastructure?
10. What are the main steps in developing a security policy? Please explain.
11. What type of vulnerabilities can be found in an e-commerce infrastructure?
12. List three types of system failures. Please give an example of each.
13. Explain how key encryption algorithms work. How many types are there?
HTML, Dynamic Databases and Security, AD660 - Boston University, M. Goncalves, Spring 2013
3
14. Which parameter in the <td> tag specifies a span of 2 rows?
A. width=2
B. rowspan=2
C. colspan=2.
15. #0000FF represents what color?
A. Blue
B. Green
C. red
16. Which of the following lines of code is considered incorrect syntax based on the rules of HTML?
A. <b>Banana</b><br>
B. <i><b>Cherry</b></i>
C. <b><i>Apple</b></i>
17.
Which of the following creates a hyperlink?
A
<img src="http://bu.edu">bu.edu
B
<li>bu.edu</li>
C
<A HREF="http://bu.edu">bu.edu</A>
18. Which of the following is NOT used to bold text?
A <strong>
B <b>
C <s>
19. Which of the following does NOT increase the size of text?
A
<h1>
B
<i>
C
<font size="+1">
20. Which of the following is NOT part of the comments tag?
A
<!-B
<!/>
C
-->
21. Which tag creates a bullet?
A
<br>
B
<b>
C
<li>
22
The code <td bgcolor="red"><font color="blue">Apple</font></td> will display Apple in
what color text?
A. black
HTML, Dynamic Databases and Security, AD660 - Boston University, M. Goncalves, Spring 2013
4
B. blue
C. red
23.
The default vertical alignment for <td> is:
A. bottom
B. top
C. middle
24.
Meta tags are generally placed within which container tags?
A. <option></option>
B. <head></head>
C. <title></title>
25.
HTML is a subset of:
A. Perl
B. SGML
C. Java
HTML, Dynamic Databases and Security, AD660 - Boston University, M. Goncalves, Spring 2013
5
Download