C725 WGU CISSP Study Guide 8th Edition Quizzes | with COMPLETE SOLUTION
Signature Detection Signature detection mechanisms use known descriptions of viruses to identify malicious code resident on a system. Domain 3: Security Architecture and Engineering 3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements Malicious Code - What is the most commonly used technique to protect against virus attacks? A Signature detection B Automated reconstruction C Data integrity assurance D Heuristic detection Backdoor Back doors are undocumented command sequences that allow individuals with knowledge of the back door to bypass normal access restrictions. Domain 3: Security Architecture and Engineering 3.6 Assess and mitigate vulnerabilities in web-based systems Application Attacks - Ben's system was infected by malicious code that modified the operating system to allow the malicious code author to gain access to his files. What type of exploit did this attacker engage in? A Escalation of privilege B Back door C Rootkit D Buffer overflow
Escuela, estudio y materia
- Institución
-
Western Governors University
- Grado
-
C725 WGU CISSP
Información del documento
- Subido en
- 31 de agosto de 2022
- Número de páginas
- 27
- Escrito en
- 2022/2023
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
c725 wgu cissp study guide 8th edition quizzes | with complete solution
Documento también disponible en un lote