Computer Science > QUESTIONS & ANSWERS > WGU C725 CISSP Study Guide 8th Edition Quizzes Latest Updated 2022 (All)
WGU C725 CISSP Study Guide 8th Edition Quizzes Latest Updated 2022 Signature Detection Signature detection mechanisms use known descriptions of viruses to identify malicious code resident on a sys ... tem. Domain 3: Security Architecture and Engineering 3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements Malicious Code ✔✔What is the most commonly used technique to protect against virus attacks? A Signature detection B Automated reconstruction C Data integrity assurance D Heuristic detection Backdoor Back doors are undocumented command sequences that allow individuals with knowledge of the back door to bypass normal access restrictions. Domain 3: Security Architecture and Engineering 3.6 Assess and mitigate vulnerabilities in web-based systems Application Attacks ✔✔Ben's system was infected by malicious code that modified the operating system to allow the malicious code author to gain access to his files. What type of exploit did this attacker engage in? A Escalation of privilege B Back door C Rootkit D Buffer overflow Buffer Overflow Buffer overflow attacks allow an attacker to modify the contents of a system's memory by writing beyond the space allocated for a variable. Domain 3: Security Architecture and Engineering 3.6 Assess and mitigate vulnerabilities in web-based systems Application Attacks ✔✔What type of application vulnerability most directly allows an attacker to modify the contents of a system's memory? A TOC/TOU B Back door C Rootkit D Buffer overflow Reflected Input Cross-site scripting attacks are successful only against web applications that include reflected input. Domain 8: Software Development Security 8.5 Define and apply secure coding guidelines and standards Web App Security ✔✔What condition is necessary on a web page for it to be used in a cross-site scripting attack? A .NET technology B Database-driven content C Reflected input D CGI scripts Stuxnet Stuxnet was a highly sophisticated worm designed to destroy nuclear enrichment centrifuges attached to Siemens controllers. 3.0 Domain 3: Security Architecture and Engineering 3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements Malicious Code ✔✔What worm was the first to cause major physical damage to a facility? A Melissa B RTM C Stuxnet D Code Red DMZ (demilitarized zone) The DMZ (demilitarized zone) is designed to house systems like web servers that must be accessible from both the internal and external networks. Domain 8: Software Development Security 8.2 Identify and apply security controls in development environments Web App Security ✔✔You are the security administrator for an e-commerce company and are placing a new web server into production. What network zone should you use? A Intranet B Sandbox C Internet D DMZ fsas3alG Except option C, the choices are forms of common words that might be found during a dictionary attack. mike is a name and would be easily detected. elppa is simply apple spelled backward, and dayorange combines two dictionary words. Crack and other utilities can easily see through these "sneaky" techniques. Option C is simply a random string of characters that a dictionary attack would not uncover. Domain 3: Security Architecture and Engineering 3.6 Assess and mitigate vulnerabilities in web-based systems Password Attacks ✔✔Which one of the following passwords is least likely to be compromised during a dictionary attack? A elppa B dayorange C fsas3alG D mike Salting Salting passwords adds a random value to the password prior to hashing, making it impractical to construct a rainbow table of all possible values. 3.0 Domain 3: Security Architecture and Engineering 3.6 Assess and mitigate vulnerabilities in web-based systems Password Attacks ✔✔What technique may be used to limit the effectiveness of rainbow table attacks? A Salting B Hashing C Transport encryption D Digital signatures Port Scan Port scans reveal the ports associated with services running on a machine and available to the public. 3.0 Domain 3: Security Architecture and Engineering 3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements Reconnaissance Attacks ✔✔What type of reconnaissance attack provides attackers with useful information about the services running on a system? A Dumpster diving B Port scan C Session hijacking D IP sweep LastPass LastPass is a tool that allows users to create unique, strong passwords for each service they use without the burden of memorizing them all. 3.0 Domain 3: Security Architecture and Engineering 3.6 Assess and mitigate vulnerabilities in web-based systems Password Attacks ✔✔Which one of the following tools provides a solution to the problem of users forgetting complex passwords? A Tripwire B Shadow password files C Crack D LastPass Zero-Day Exploit While an advanced persistent threat (APT) may leverage any of these attacks, they are most closely associated with zero-day attacks. 3.0 Domain 3: Security Architecture and Engineering 3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements Malicious Code ✔✔Which one of the following techniques is most closely associated with APT (Advanced Persistent Threat) attacks? A Social engineering B Zero-day exploit C SQL injection D Trojan horse The SCRIPT (Note: enclosed in <>) tag is us [Show More]
Last updated: 3 years ago
Preview 1 out of 38 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
WGU C725 Bundled Exams Questions and Answers Latest Updated 2022 Rated A
By Nutmegs 3 years ago
$20
13
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 16, 2022
Number of pages
38
Written in
All
This document has been written for:
Uploaded
Aug 16, 2022
Downloads
0
Views
150
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·