COMPLETE SOLUTIONS 2026
What are the potential problems with total software reinstallation? - ANSWERSTotal
software reinstallation does not address lost data since the last backup and the software
will have to be re-baselined to proper security, which is a time consuming process.
What is a buffer? - ANSWERSA temporary storage area in memory
What is a buffer overflow attack? - ANSWERSAn attack that writes data longer than the
space allocated for it in the buffer.
What impacts can buffer overflows have? - ANSWERSThe impact of a buffer overflow
can range from nothing to the crashing of the server, or the ability to execute any
command on the server.
In a stack overflow, what is overwritten by the overflow? - ANSWERSThe return
address in a stack is overwritten in a stack overflow.
To where does the overwritten return address point? - ANSWERSThe overwritten
address will point to data in the buffer, which will actually be program/attack code that
will be executed instead of legitimate code.
In the IIS IPP buffer overflow attack, what buffer is overflowed? - ANSWERSThe host to
which the request should go is overflowed. The host name is replaced with a 420-
character string that causes a buffer overflow.
Why are HTML bodies in e-mail messages dangerous? - ANSWERSHTML can contain
malicious scripts.
What is spam? - ANSWERSSpam is unsolicited commercial email.
What three problems does spam create? - ANSWERSSpam clogs mailboxes, slows
user computers, and annoys users by requiring them to spend time deleting the
unwanted messages.
Why is spam filtering dangerous? - ANSWERSSpam filtering is dangerous because
valid email will eventually be affected.
For what legal reason should companies filter sexually or racially harassing message
content? - ANSWERSFiltering explicit message content shows that the company does
not tolerate this type of action and tries to stop it. (In case of lawsuits, this may help.)
, What is extrusion prevention? - ANSWERSPreventing certain information from leaving
the company
Why is extrusion prevention needed for intellectual property? - ANSWERSIt prevents
the loss of trade secrets.
What is PII, and why must it be prevented from leaving the firm? - ANSWERSPII is
Personally Identifiable Information (such as SSN, date of birth, address, etc.) that must
be prevented from leaving a firm in order to avoid lawsuits related to identify theft or
credit card theft.
What is the Danvers Doctrine? - ANSWERSThe general thrust by the IETF to add
strong security to all or nearly all of its standards
Distinguish between security in SNMP V1 and security in SNMP V2. - ANSWERSSNMP
v1 had no security at all. SNMP v2 introduces community strings in which a shared
secret between manager and managed devices was used to authenticate messages.
However, the same secret was used on all devices, making it easy to crack and lose
control of the secret. Also, the secret is sent in the clear, making it vulnerable to network
sniffers.
How can data be protected while it is being processed? - ANSWERSData can be
protected by making sure applications are securely coded and hosts are hardened.
What are some ways that data can be attacked when it is stored? - ANSWERSIt can be
accessed by unauthorized persons, destroyed, copied without permission, and taken
outside the organization (i.e., data loss).
How can data be protected while it is being stored? - ANSWERSIt can be properly
backed up, encrypted, and when necessary, destroyed. Restrictions on access to the
data can also be implemented while it is being stored.
Distinguish between security in SNMP V2 and security in SNMP V3. - ANSWERSSNMP
v2 security, consisting of community strings, was an improvement over SNMP v1, but
still very inadequate. SNMP v3 added individual secrets shared between manager and
devices for authentication. SNMP v3 also added confidentiality, message integrity, and
time stamps to guard against replay attacks.
What still needs to be done for SNMP security? - ANSWERSFuture versions of SNMP
should include a public-key implementation to provide strongest cryptographic controls
for authentication, confidentiality, and message integrity.
What is the difference between data and information? - ANSWERSData are raw facts.
Information is meaning extracted from data.