Question

This protocol is vulnerable to the BREACH and CRIME attacks. Traffic over this protocol is filtered by WAFs (“waafs”). New design features in this protocol include only allowing “trailers” as a value for the Transfer-Encoding header and the delegation of features to the QUIC (“quick”) protocol. Vulnerabilities in this protocol are exploited by the High Orbit Ion Cannon and slowloris (“slow-loris”) tools. To reduce latency in this protocol, Google designed SPDY (“speedy”). Because pipelining in older versions of this protocol was prone to head-of-line blocking, it now implements multiplexing of requests over persistent connections. This stateless protocol, which resides in layer 7 of the OSI (“O-S-I”) model, was designed by Tim Berners-Lee. (10[1])This application (10[1])layer protocol, which runs on top of TCP, uses requests such as PUT (“put”), POST (“post”), and GET (“get”). For 10 points, name this protocol used for communication between browsers and Web servers. ■END■

ANSWER: HTTP [or Hypertext Transfer Protocol; accept versions of HTTP such as HTTP/1.0, HTTP/1.1, HTTP/2, or HTTP/3; accept HTTPS or Hypertext Transfer Protocol Secure] (WAFs are Web Application Firewalls.)
<Other Science>
= Average correct buzz position

Buzzes

PlayerTeamOpponentBuzz PositionValue
June YinWUSTL BPenn A10610
Hari ParameswaranGeorgia Tech ACornell A10810

Summary

2023 ACF Nationals04/22/2023Y2100%0%0%107.00