Which one of the following statements is
NOT correct about HTTP cookies?
a. A cookies is a piece of code that has
the potential to compromise the
security of an Internet user
b. A cookie gains entry to the user’s
work area through an HTTP header
c. A cookie has an expiry date and time
d. Cookies can be used to track the
browsing pattern of a user at a
particular site

1 Answer

Answer :

a. A cookies is a piece of code that has
the potential to compromise the
security of an Internet user

Related questions

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : I have two containers of premade Toll House cookie dough and it's 3 months past the "use by or freeze by" date. Is it safe to make and eat the cookies?

Last Answer : Does it smell or look funny?

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above

Last Answer : c. Checksum

Description : Which one of the following is not a reason why the users of financial statements desire for an independent assessment of the financial statement presentation? a. Complexity of transactions affecting the ... c. Remoteness of the user from the organization d. All of them are potential reasons

Last Answer : Lack of criteria on which to base information

Description : The need for assurance services arises because: a. There is a potential bias in providing information. b. Economic transactions are less complex than they were a decade ago. c. There is a consonance ... . d. Most users today have access to the system that generates the financial statements they use

Last Answer : There is a potential bias in providing information

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : State weather the following statement is true or false for Multipurpose Internet Mail Extensions 1).The general syntax for MIME header fields is not the same as that for RFC 2822. 2).MIME header field names are never ... false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : How to make cookie in php track both in www.site.com and site.com for some web-site?

Last Answer : answer:Set the domain argument to just '.site.com', including the leading period, rather than accepting the default (which will be whatever the current domain is) http://php.net/manual/en/function.setcookie.php ... So you might have something like: setcookie( my_cookie', 123, 0, , '.site.com');

Description : _____defines how a particular pattern to be interpreted,and whataction is tobe taken based on that interpretation. A) Semantics B) Syntax C) Timing D) None of the abov

Last Answer : Semantics

Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : C) cookie

Description : A ………….. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : D) transkie

Description : Cookies are used to do which of the following? a. Store your ID and password for subsequent logons to the site b. Store contents of electronic shopping carts c. To track web activity d. All of the above and more

Last Answer : d. All of the above and more

Description : At stage of user browsing app store page of your app what is the objective? A. Maximize usage B. Maximize conversion C. Maximize interest D. All of the above

Last Answer : B. Maximize conversion

Description : Match the following Layers and Protocols for a user browsing with SSL: a. Application of layer i. TCP b. Transport layer ii. IP c. Network layer iii. PPP d. Datalink layer iv. HTTP

Last Answer : Answer: 1

Description : In IPv6,a ______address is used ifa site with several networks uses the Internetprotocols but is not connectedto the Internet for security reasons. A) link local B) site local C) mapped D) none of the abov

Last Answer : site local

Description : In IPv6,a _______address is usedif aLAN uses the Internet protocols but isnot connected tothe Internet for security reasons. A) link local B) site local C) mapped D) none of the above

Last Answer : link local

Description : Mark the correct option a) If the certificate is encashed in case of death of the depositor before expiry on of  one year from the date of purchase, only the face value of certificate shall be  payable b ... after expiry of one year SB interest will be applicable c) Both A &B d) None of these

Last Answer : d) None of these

Description : Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web ... DNS. a. 4,2,1,3 b. 1,2,3,4 c. 4,1,2,3 d. 2,4,1,3

Last Answer : a. 4,2,1,3

Description : I'm taking cookie orders; what are your favorite kinds of Christmas cookies?

Last Answer : Springerle. My absolute favorite cookie of all time. I’ve got the rolling pin if you need to borrow it. And hey—aren’t you close enough to get it without too much hassle?

Description : If i take pre-made chocolate chip cookie dough and roll teaspoonfulls in oatmeal, will the result be similar to chocolate chip oatmeal cookies?

Last Answer : You would be better off adding chocolate bits to oatmeal cookie mix.

Description : Is there a better store bought cookie than one of Mother's Iced Raisin cookies?

Last Answer : Well, those are great! I love Pepperidge Farm’s Mint Milanos and Brussells. And sometimes, I just have to have Oreos.

Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above

Last Answer : Security

Description : Location is a unique feature of Mobile Marketing because ____________. A. It enables brands to hyper-target their customers. B. It allows you to customize the marketing messages to suit the needs ... particular location. D. You can run different campaigns based on the location of the mobile use

Last Answer : B. It allows you to customize the marketing messages to suit the needs of users of a particular location

Description : Location is a unique feature of Mobile Marketing because ____________. A. It enables brands to hyper-target their customers. B. It allows you to customize the marketing messages to suit the needs ... location. D. You can run different campaigns based on the location of the mobile user.

Last Answer : B. It allows you to customize the marketing messages to suit the needs of users of a particular location.

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : Ina synchronous modem, the receive equilizer is known as a. adaptive equilizer b. impariment equilizer c. statistical equilizer d. compromise equilizer

Last Answer : adaptive equilizer

Description : Time period that is considered from the inception of the credit, investment or negotiable instrument and ends upon the maturity or expiry of the instrument is referred as ________ A. Amortisation Period B. Amortising Swap C. Asset Backed Security D. Attrition Analysis

Last Answer : A. Amortisation Period Explanation: The amortisation period on a mortgage is the total length of time it will take you to pay off your mortgage.

Description : Which one of the following fields of an IP header is NOT modified by a typical IP router? a. Checksum b. Source address c. Time to Live (TTL) d. Length

Last Answer : b. Source address

Description : Under the SARFAESI Act, 2002, the Central Registrar may allow the filing of the particulars of creation of security interest within _____ next following the expiry of the period of initial thirty days on payment of additional fee. a) Ten days b) Thirty days c) Twenty-five days d) Fifteen days

Last Answer : b) Thirty days

Description : Where can i buy this print? - http://www.yourarthere.com/entry/the-truth-seekers-radio/?

Last Answer : I’d contact the artist.

Description : What is the main difference between DDCMP and SDLC? a. DDCMP does not need special hardware to final the beginning of a message b. DDCMP has a message header c. SDLC has a IP address d. SDLC does not use CRC

Last Answer : DDCMP does not need special hardware to final the beginning of a message

Description : In IPv6, when a datagram needs tobediscarded ina congested network, the decision is basedon the _______ field in thebase header. A) hop limit B) priority C) nextheader D) noneof the above

Last Answer : priority

Description : In IPv6,options are inserted between the _________and the ___________ data. A) baseheader;extensionheader B) baseheader;upper-layer data C) base header; frame header D) noneof the abov

Last Answer : baseheader;upper-layer data

Description : n IPv4,an HLEN value ofdecimal10 means _______. A) there are 10bytes ofoptions B) there are 40bytes ofoptions C) there are 40bytes inthe header D) noneof the above

Last Answer : there are 40bytes inthe header

Description : In IPv6, the _______ field inthe baseheader restricts the lifetime ofa datagram. A) version B) next-header C) hoplimit D) neighbor-advertisemen

Last Answer : hoplimit

Description : Which of the following is anecessary part of the IPv6 datagram? A) Base header B) Extension header C) Data packet from the upper layer D) (a) and (c)

Last Answer : Base header

Description : In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400bytes? A) 428 B) 407 C) 107 D) 427

Last Answer : 428

Description : In IPv4 header, an HLEN value of decimal 10 means_______. A) there are 10bytes ofoptions B) there are 40bytes ofoptions C) there are 10bytes inthe header D) thereare 40 bytes in the header

Last Answer : thereare 40 bytes in the header

Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : thedestination IP address in the datagram header

Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : the IP address of therouter found inthe routing table

Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : hedestination IP address in the datagram header

Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : b. content-transfer-encoding

Description : In the MIME header field____describes how the object within the body is to be interpreted. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : a. content-type

Description : In the SMTP header field_____ is a summary of the message being sent which is specified by the sender. a. Reply-to b. Return-path c. Subject d. From

Last Answer : c. Subject