WGU-C706 Secure Software Design (Lesson 21 CISSP), Questions and answers. VERIFIED. RATED A+ 2024
Which one of the following types of attacks relies on the difference between the timing of two events? - -TOCTOU What technique may be used to limit the effectiveness of rainbow table attacks? - -Salting What character should always be treated carefully when encountered as user input on a web form? - -' What type of virus utilizes more than one propagation technique to maximize the number of penetrated systems? - -Multipartite virus What advanced virus technique modifies the malicious code of a virus on each system it infects? - - Polymorphism Which one of the following passwords is least likely to be compromised during a dictionary attack? - - fsas3alG What worm was the first to cause major physical damage to a facility? - -Stuxnet What type of application vulnerability most directly allows an attacker to modify the contents of a system's memory? - -Buffer overflow
Escuela, estudio y materia
- Institución
- Western Governors University
- Grado
- WGU C706
Información del documento
- Subido en
- 26 de octubre de 2023
- Número de páginas
- 2
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
wgu c706 secure software design lesson 21 cissp
Documento también disponible en un lote