D430 Section 6
Review
Questions and
answers
Which type of intrusion detection system (IDS) is
used to analyze activities on the network interface
of a particular asset? - answer Host-based
Which security mechanism hardens operating
systems (OS) by limiting user access to the
minimum permissions needed to carry out tasks? -
answer Apply the principle of least privilege
Which tool is used for port scanning and to
discover devices on a network? - answer Nmap
(used for port scanning, discovering devices, and
searching for hosts on a network. It is an important
tool to help identify and remove unessential
services when hardening an operating system)
, What is reduced by hardening an operating
system? - answer attack surface
What is used to prevent buffer overflow? - answer
bounds checking (sets a limit on the amount of
data an application takes in)
Which type of vulnerability is present when
multiple threads within a process control access to
a particular resource? - answer race condition
(occurs when multiple threads within a process
control access to a particular resource and the
correct handling depends on timing or
transactions)
Which type of attack occurs when certain print
functions within a programming language are used
to manipulate and view the internal memory of an
application? - answer format string (these attacks
occur when certain print functions within a
programming language can be used to manipulate
or view the internal memory of an application)
Which type of attack is an example of an input
validation attack? - answer format string
What does an organization need to do to the attack
surface to protect its devices and network? -
Review
Questions and
answers
Which type of intrusion detection system (IDS) is
used to analyze activities on the network interface
of a particular asset? - answer Host-based
Which security mechanism hardens operating
systems (OS) by limiting user access to the
minimum permissions needed to carry out tasks? -
answer Apply the principle of least privilege
Which tool is used for port scanning and to
discover devices on a network? - answer Nmap
(used for port scanning, discovering devices, and
searching for hosts on a network. It is an important
tool to help identify and remove unessential
services when hardening an operating system)
, What is reduced by hardening an operating
system? - answer attack surface
What is used to prevent buffer overflow? - answer
bounds checking (sets a limit on the amount of
data an application takes in)
Which type of vulnerability is present when
multiple threads within a process control access to
a particular resource? - answer race condition
(occurs when multiple threads within a process
control access to a particular resource and the
correct handling depends on timing or
transactions)
Which type of attack occurs when certain print
functions within a programming language are used
to manipulate and view the internal memory of an
application? - answer format string (these attacks
occur when certain print functions within a
programming language can be used to manipulate
or view the internal memory of an application)
Which type of attack is an example of an input
validation attack? - answer format string
What does an organization need to do to the attack
surface to protect its devices and network? -