A. Signature detection
B. Heuristic detection
C. Data integrity assurance
D. Automated reconstruction
Answer: A
Signature detection mechanisms use known descriptions of viruses to identify malicious code resident on a system.
A. Internet
B. DMZ
C. Intranet
D. Sandbox
Answer: B
The DMZ (demilitarized zone) is designed to house systems like web servers that must be accessible from both the internal and external networks.
A. Smurf
B. TOCTTOU
C. Land
D. Fraggle
Answer: B
The time-of-check-to-time-of-use (TOCTTOU) attack relies on the timing of the execution of two events.
A. Sandboxing
B. Control signing
C. Integrity monitoring
D. Whitelisting
Answer: D
Application whitelisting requires that administrators specify approved applications, and then the operating system uses this list to allow only known good applications to run.
A. Polymorphism
B. Stealth
C. Encryption
D. Multipartitism
Answer: A
In an attempt to avoid detection by signature-based antivirus software packages, polymorphic viruses modify their own code each time they infect a system.
A. LastPass
B. Crack
C. Shadow password files
D. Tripwire
Answer: A
LastPass is a tool that allows users to create unique, strong passwords for each service they use without the burden of memorizing them all.
A. Rootkit
B. Back door
C. TOC/TOU
D. Buffer overflow
Answer: D
Buffer overflow attacks allow an attacker to modify the contents of a system’s memory by writing beyond the space allocated for a variable.
A. mike
B. elppa
C. dayorange
D. fsas3a1G
Answer: D
Except option D, the choices are forms of common words that might be found during a dictionary attack. mike is a name and would be easily detected. elppa is simply apple spelled backward, and dayorange combines two dictionary words. Crack and other utilities can easily see through these “sneaky” techniques. Option D is simply a random string of characters that a dictionary attack would not uncover.
A. /etc/passwd
B. /etc/shadow
C. /etc/security
D. /etc/pwlog
Answer: B
Shadow password files move encrypted password information from the publicly readable /etc/passwd file to the protected /etc/shadow file.
A. !
B. &
C. *
D. ‘
Answer: D
The single quote character (‘) is used in SQL queries and must be handled carefully on web forms to protect against SQL injection attacks.
A. Triggers
B. Stored procedures
C. Column encryption
D. Concurrency control
Answer: B
Developers of web applications should leverage database stored procedures to limit the application’s ability to execute arbitrary code. With stored procedures, the SQL statement resides on the database server and may only be modified by database administrators.
A. Session hijacking
B. Port scan
C. Dumpster diving
D. IP sweep
Answer: B
Port scans reveal the ports associated with services running on a machine and available to the public.
A. Reflected input
B. Database-driven content
C. NET technology
D. CGI scripts
Answer: A
Cross-site scripting attacks are successful only against web applications that include reflected input.
A. Stealth virus
B. Companion virus
C. Polymorphic virus
D. Multipartite virus
Answer: D
Multipartite viruses use two or more propagation techniques (for example, file infection and boot sector infection) to maximize their reach.
A. Limiting account privileges
B. Input validation
C. User authentication
D. Encryption
Answer: B
Input validation prevents cross-site scripting attacks by limiting user input to a predefined range. This prevents the attacker from including the HTML
A. Stuxnet
B. Code Red
C. Melissa
D. rtm
Answer: A
Stuxnet was a highly sophisticated worm designed to destroy nuclear enrichment centrifuges attached to Siemens controllers.
A. Escalation of privilege
B. Back door
C. Rootkit
D. Buffer overflow
Answer: B
Back doors are undocumented command sequences that allow individuals with knowledge of the back door to bypass normal access restrictions.
A. Confidentiality
B. Encryption
C. Stealth
D. Sandbox
Answer: D
The Java sandbox isolates applets and allows them to run within a protected environment, limiting the effect they may have on the rest of the system.
A. <h1>
B.
C.
D.
</h1>
Answer: D
The tag is used to indicate the beginning of an executable client-side script and is used in reflected input to create a cross-site scripting attack.
A. Packets with internal source IP addresses don’t enter the network from the outside.
B. Packets with internal source IP addresses don’t exit the network from the inside.
C. Packets with public IP addresses don’t pass through the router in either direction.
D. Packets with external source IP addresses don’t enter the network from the outside.
Answer: A
Packets with internal source IP addresses should not be allowed to enter the network from the outside because they are likely spoofed.