100% satisfaction guarantee Immediately available after payment Read online or as PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CYSE 101 Final Exam Jones

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
24-10-2023
Written in
2023/2024

How does the principle of least privilege apply to operating system hardening? - Answer- prevents attack actions that require administrator or root privilege What is the difference between a port scanner and a vulnerability assessment tool? - Answer- port scanners discover listening ports; vulnerability assessment tools report known vulnerabilities on listening ports What does applying a vendor OS update (patch) usually do? - Answer- What does executable space protection do for us and how? - Answer- prevents buffer overflow attacks from working by blocking code execution on the memory stack If an antivirus tool is looking for specific bytes in a file (e.g., hex 50 72 6F etc.) to label it malicious, what type of AV detection is this? - Answer- signature Which of the following is not part of operating system hardening? - Answer- Changing the main network firewall ruleset Why might we want a (software) firewall (FW) on our host if one already exists on the network? - Answer- host FWs know more about the local system Are nmap results always accurate, or is it sometimes necessary to verify nmap output with another tool? - Answer- you should verify nmap results with another tool or data source Exploit frameworks make it... - Answer- easier for amateurs to launch cyber attacks What is a cyber attack surface? - Answer- the total of the number of available avenues through which our system might be attacked What does a fuzzing tool do? - Answer- Provide multiple data and inputs to discover vulnerabilities What does the tool Nikto do? - Answer- Scans a web server for common vulnerabilities Why is input validation important from a security perspective? - Answer- to prevent certain types of attacks How can we prevent buffer overflows in our applications? - Answer- implement proper bounds checking Does an SQL injection attack compromise content in the database or content in the Web application? - Answer- database

Show more Read less
Institution
CYSE 101
Course
CYSE 101









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CYSE 101
Course
CYSE 101

Document information

Uploaded on
October 24, 2023
Number of pages
5
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • cyse 101 final exam jones

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEEKA YALA UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
2055
Member since
4 year
Number of followers
1446
Documents
51244
Last sold
2 hours ago

3.8

353 reviews

5
177
4
61
3
46
2
16
1
53

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions