Question 6 of 140Applying masks in Flash allows for the creation of depth on the Web page. Which of the following is true when creating vector masks? Question 7 of 140Which of the following is directly exploited by a brute-force attack? Question 8 of 140Which of the following is an acceptable way to insert a background image using a style sheet? [1] B. background-image: url(background.tiff); [1] [1] Question 9 of 140Certain Web sites are known to be successful. What do these successful Web sites have in common? Question 10 of 140Server and operating system vendors regularly update their software by offering security patches when new vulnerabilities are discovered. To keep your Web site and server safe, you should apply security patches: