Questions and Answers 100% Pass
1) If a hacker takes over an application program, he or she receives the permissions with
which the program runs. - ✔✔TRUE
2) The most popular way for hackers to take over hosts today is ________.
A) by taking over the operating system
B) by taking over an application
C) by guessing the root password
D) by taking over the user interface - ✔✔B
4) An attacker types more data in a field than the programmer expected. This is a(n)
________ attack.
A) denial-of-service
B) directory traversal
C) buffer overflow
D) XSS - ✔✔C
Brittie Donald, All Rights Reserved © 2025 1
,3) Operating system hardening is more total work than application hardening. -
✔✔FALSE
5) In a stack overflow attack, to where does the return address point?
A) To the beginning of the stack entry's data area
B) To the end of the stack entry's data area
C) To the next command in the program being hacked
D) To the return address entry in the stack entry - ✔✔A
6) When executing attack code, if the attacker has skillfully overwritten the return
address, the return address will not point back to "data" in the buffer. - ✔✔FALSE
Brittie Donald, All Rights Reserved © 2025 2
, 7) Overall for firms, which is more time consuming to patch?
A) Applications
B) Operating systems
C) Both are about equally time consuming to patch
D) None of the above - ✔✔A
8) Experts advise firms to turn on most or all applications and then harden them. -
✔✔FALSE
9) To prevent eavesdropping, applications should ________.
A) be updating regularly
B) use electronic signatures
C) use encryption for confidentiality
D) use encryption for authentication - ✔✔C
10) Generally speaking, vendors use similar mechanisms for downloading and
installing patches. - ✔✔FALSE
11) The first task in security is to understand the environment to be protected. -
✔✔TRUE
Brittie Donald, All Rights Reserved © 2025 3