D. The correct answer is A resource exhaustion attack. Resource
exhaustion attacks are computer security exploits that crash, hang,
or otherwise interfere with the targeted program or system. They
are a form of denial-of-service attack but are different from
distributed denial-of-service attacks, which involve overwhelming a
network host such as a web server with requests from many
locations.
D. The correct answer is War flying. War flying is an activity
consisting of using an airplane and a Wi-Fi-equipped computer,
such as a laptop or a PDA, to detect Wi-Fi wireless networks. War
flying shares similarities to Wardriving and Warwalking in all
aspects except for the method of transport
B. The correct answer is False negative. A false negative state is
when the IDS identifies an activity as acceptable when the activity
is actually an attack. That is, a false negative is when the IDS fails
to catch an attack.
A. The correct answer is They are often in plain text. Passwords
stored in memory are stored in plain text usually. This makes it easy
for the attackers to recover the password when they access the
memory, even if the storage is temporary.
D. The correct answer is All the above.
D. The correct answer is Web server logs. XML injection is majorly perpetrated by altering HTTP queries sent to an XML-based web service. When you check the web server log, you can see if any unexpected user input is visible in the logs.
B. The correct answer is An IPS. The data he needs is likely to come from an IPS. When he gets that, he can then determine if the attack is a DoS attack, and the IPS can help him determine the source of the DoS attack.
D. The correct answer is Configuration review. Configuration reviews and configuration management tools can be used to ensure that no unwanted ports or services are accessible.
B. The correct answer is Vendor diversity. Vendor diversity is the practice of implementing security controls from different vendors to increase security. Many DMZs use two firewalls and vendor diversity dictates the use of firewalls from different vendors.
For example, one firewall could be a Cisco firewall and the other one could be a Check Point firewall. If a vulnerability is discovered
in one of these firewalls, an attacker might be able to exploit it. However, it’s unlikely that both firewalls would develop a vulnerability at the same time.
D. The correct answer is Something you can do. Something you can do is a type of authentication which proves identities by
observing actions. These actions could be things like gestures or touches. Windows 8 users might know about a feature called
Picture Password. This feature allows the user to set up gestures and touches on a picture as a way to authenticate themselves.
D. The correct answer is Key stretching. Key stretching is the practice of converting a password to a longer and more random key
for cryptographic purposes such as encryption. This is generally recognized as making encryption stronger as it ensures that the encryption itself is reasonably hard.
D. The correct answer is Perfect forward secrecy. In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key agreement protocols that gives assurances that session keys will not be compromised even if longterm secrets used in the session key exchange are compromised.
B. The correct answer is Test server. The Test Server is a place
where new updates, features, and mechanics are tested before
being released to the main servers. Sometimes, these servers are in a closed-testing mode, meaning that only developers and testers can access them.
D. The correct answer is Honeypot. In computer terminology, a
honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems.
Generally, a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site and contain information or resources of value to attackers. It is actually isolated,
monitored, and capable of blocking or analyzing the attackers. This is similar to police sting operations, colloquially known as “baiting” a suspect.