C725 WGU CISSP Study Guide 8th Edition Quizzes| questions with complete solutions
Signature Detection Signature detection mechanisms use known descriptions of viruses to identify malicious code resident on a system. Domain 3: Security Architecture and Engineering 3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements Malicious Code Correct Answer: What is the most commonly used technique to protect against virus attacks? A Signature detection B Automated reconstruction C Data integrity assurance D Heuristic detection Backdoor Back doors are undocumented command sequences that allow individuals with knowledge of the back door to bypass normal access restrictions. Domain 3: Security Architecture and Engineering 3.6 Assess and mitigate vulnerabilities in web-based systems Application Attacks Correct Answer: Ben's system was infected by malicious code that modified the operating system to allow the malicious code author to gain access to his files. What type of exploit did this attacker engage in? A Escalation of privilege B Back door C Rootkit D Buffer overflow Buffer Overflow Buffer overflow attacks allow an attacker to modify the contents of a system's memory by writing beyond the space allocated for a variable. Domain 3: Security Architecture and Engineering 3.6 Assess and mitigate vulnerabilities in web-based systems Application Attacks Correct Answer: What type of application vulnerability most directly allows an attacker to modify the contents of a system's memory? A TOC/TOU B Back door C Rootkit
Escuela, estudio y materia
- Institución
- Western Governors University
- Grado
- C725 WGU CISSP
Información del documento
- Subido en
- 12 de noviembre de 2022
- Número de páginas
- 26
- Escrito en
- 2022/2023
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
c725 wgu cissp study guide 8th edition quizzes| questions with complete solutions
Documento también disponible en un lote