C725 WGU CISSP Study Guide 8th Edition Quizzes| questions with complete solutions
Signature Detection Signature detection mechanisms use known descriptions of viruses to identify malicious code resident on a system. Domain 3: Security Architecture and Engineering 3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements Malicious Code Correct Answer: What is the most commonly used technique to protect against virus attacks? A Signature detection B Automated reconstruction C Data integrity assurance D Heuristic detection Backdoor Back doors are undocumented command sequences that allow individuals with knowledge of the back door to bypass normal access restrictions. Domain 3: Security Architecture and Engineering 3.6 Assess and mitigate vulnerabilities in web-based systems Application Attacks Correct Answer: Ben's system was infected by malicious code that modified the operating system to allow the malicious code author to gain access to his files. What type of exploit did this attacker engage in? A Escalation of privilege B Back door C Rootkit D Buffer overflow Buffer Overflow Buffer overflow attacks allow an attacker to modify the contents of a system's memory by writing beyond the space allocated for a variable. Domain 3: Security Architecture and Engineering 3.6 Assess and mitigate vulnerabilities in web-based systems Application Attacks Correct Answer: What type of application vulnerability most directly allows an attacker to modify the contents of a system's memory? A TOC/TOU B Back door C Rootkit
Written for
- Institution
-
Western Governors University
- Course
-
C725 WGU CISSP
Document information
- Uploaded on
- November 12, 2022
- Number of pages
- 26
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
c725 wgu cissp study guide 8th edition quizzes| questions with complete solutions
Also available in package deal