A disgruntled employee has discovered that the company Web server is not protected against a particular buffer overflow vulnerability. The disgruntled employee has created an application to take advantage of this vulnerability and secretly obtain sensitive data from the Web server's hard disk. This application sends a set of packets to the Web server that causes it to present an unauthenticated terminal with root privileges. What is the name for this particular type of attack?
Answer : D
Which of the following details should be included in documentation of an attack?
Answer : C
Which of the following errors most commonly occurs when responding to a security breach?
Answer : C
You have implemented a service on a Linux system that allows a user to read and edit resources. What is the function of this service?
Answer : C
Which of the following can help you authoritatively trace a network flooding attack?
Answer : A
You want to create a certificate for use in a Secure Sockets Layer (SSL) session. Which of the following is responsible for verifying the identity of an individual and also issuing the certificate?
Answer : B
Which of the following describes the practice of stateful multi-layer inspection?
Answer : C
Which choice lists typical firewall functions?
Answer : C
Which algorithm can use a 128-bit key, and has been adopted as a standard by various governments and corporations?
Answer : C
Consider the following image:
From the information in this image, what type of attack is occurring?
Answer : B
A new video conferencing device has been installed on the network. You have been assigned to troubleshoot a connectivity problem between remote workers and the central company. Specifically, remote workers are having problems making any connection at all.
Which technique will most likely help you solve this problem while retaining the existing level of security at the firewall?
Answer : B
You are creating an information security policy for your company. Which of the following activities will help you focus on creating policies for the most important resources?
Answer : D
Which of the following is the primary weakness of symmetric-key encryption?
Answer : D
Which of the following is a common problem, yet commonly overlooked, in regards to physical security in server rooms?
Answer : B
Which tool is best suited for identifying applications and code on a Web server that can lead to a SQL injection attack?
Answer : A
Have any questions or issues ? Please dont hesitate to contact us