WGU-C706 Secure Software Design (Lesson 21 CISSP), Questions and answers. VERIFIED. RATED A+ 2024
Which one of the following types of attacks relies on the difference between the timing of two events? - -TOCTOU What technique may be used to limit the effectiveness of rainbow table attacks? - -Salting What character should always be treated carefully when encountered as user input on a web form? - -' What type of virus utilizes more than one propagation technique to maximize the number of penetrated systems? - -Multipartite virus What advanced virus technique modifies the malicious code of a virus on each system it infects? - - Polymorphism Which one of the following passwords is least likely to be compromised during a dictionary attack? - - fsas3alG What worm was the first to cause major physical damage to a facility? - -Stuxnet What type of application vulnerability most directly allows an attacker to modify the contents of a system's memory? - -Buffer overflow
Written for
- Institution
-
Western Governors University
- Course
-
WGU C706
Document information
- Uploaded on
- October 26, 2023
- Number of pages
- 2
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
wgu c706 secure software design lesson 21 cissp
Also available in package deal