What is the best way to restrict URL access?

A. Redirect visitors to another page.
B. Make sure sensitive pages require authentication.
C. Use the"secure"flag on all sensitive cookies.
D. Use Secure Shell (SSH).


Answer: B

Computer Science & Information Technology

You might also like to view...

Files in Office 365 have not been completely and permanently deleted, until they have been deleted from the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The process of calculating which action will lead to the greatest happiness is sometimes called the ____.

A. utilitarian calculus B. consequentialist matrix C. behavioral trigonometry D. differential calculus

Computer Science & Information Technology

Establishing a method to erase or clear memory is an example of securing which of the following?

A. Data in transit B. Data at rest C. Data in use D. Data in motion

Computer Science & Information Technology

Critical Thinking Questions Case 6-2 ? Perry wants to use the correct video format to meet the needs of the audiences for his website, and he turns to his coworker, Gino, who is a talented video editor and who knows about the best formats. ? Perry wants to use the best format for smartphones, as he knows that a number of viewers of a given video will be viewing it with smartphones. What format does Gino recommend to Perry? a.QuickTimec.MP4b.AVId.WMF

What will be an ideal response?

Computer Science & Information Technology