C725 WGU CISSP Study Guide 8th Edition Questions and answers, VERIFIED 2024 | 39 Pages
Signature Detection Signature detection mechanisms use known descriptions of viruses to identify malicious code resident on a system. Domain 3: Security Architecture and Engineering 3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements Malicious Code - -What is the most commonly used technique to protect against virus attacks? A Signature detection B Automated reconstruction C Data integrity assurance D Heuristic detection Backdoor Back doors are undocumented command sequences that allow individuals with knowledge of the back door to bypass normal access restrictions. Domain 3: Security Architecture and Engineering 3.6 Assess and mitigate vulnerabilities in web-based systems Application Attacks - -Ben's system was infected by malicious code that modified the operating system to allow the malicious code author to gain access to his files. What type of exploit did this attacker engage in?A Escalation of privilege B Back door C Rootkit D Buffer overflow Buffer Overflow Buffer overflow attacks allow an attacker to modify the contents of a system's memory by writing beyond the space allocated for a variable
Written for
- Institution
-
Western Governors University
- Course
-
C725 WGU CISSP
Document information
- Uploaded on
- October 18, 2023
- Number of pages
- 39
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
c725 wgu cissp study guide 8th edition questions a
Also available in package deal