OF INFORMATION SECURITY
Which software development vulnerability occurs when multiple processes
control or share access to a particular resource, and the correct handling of that
resource depends on the proper ordering or timing of transactions?
A Authentication attacks
B Input validation attacks
C Race conditions
D Buffer overflows
E Authorization attacks - ANSWERS-C
Which Microsoft fuzzing tool examines source code for general good practices?
A MiniFuzz File Fuzzer
B BinScope Binary Analyzer
C Nessus
D Nikto/Wikto
,E Burp Suite - ANSWERS-B
Which tool performs checks for many common server-side vulnerabilities, and
creates an index of all the files and directories it can see on the target Web
server?
A MiniFuzz File Fuzzer
B BinScope Binary Analyzer
C Nessus
D Nikto/Wikto
E NetStumbler - ANSWERS-D
Which of the following is not a major category of database security issues?
A Privilege escalation
B Arbitrary code execution
C Unauthenticated access
D Improper indexing
E Protocol issues - ANSWERS-D
Which type of tool bombards our application with data and inputs from a wide
variety of sources in an attempt to cause the application to fail or behave
unexpectedly?
,A Fuzzers
B Web application analysis tools
C Exploit frameworks
D Scanners
E Vulnerability assessment tools - ANSWERS-A
What is information security?
A Protecting information and information systems from unauthorized trust, use,
disclosure, disruption, modification, or destruction.
B Protecting information and information systems from unauthorized access, use,
degradation, disruption, modification, or destruction.
C Protecting information and information systems from unauthorized access, use,
disclosure, displacement, modification, or destruction.
D Protecting information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction. - ANSWERS-D
Which cybersecurity term is defined as the potential for an attack on a resource?
, A Impact
B Vulnerability
C Risk
D Threat - ANSWERS-D
Which security type deliberately exposes a system's vulnerabilities or resources to
an attacker?
A Intrusion detection
B Firewalls
C Honeypots
D Intrusion prevention - ANSWERS-C
Which tool can be used to map devices on a network, along with their operating
system types and versions?
A Packet sniffer
B Packet filter
C Port scanner
D Stateful firewall - ANSWERS-C