


Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
D430 Section 6 Review Questions WITH Accurate Answers
Typology: Exams
1 / 4
This page cannot be seen from the preview
Don't miss anything!
What describes a database security issue? correct answer Unauthenticated access to functionality What does an organization need to do to the attack surface to protect its devices and network? correct answer Perform system hardening (an protect an organization's devices and network, by reduce the attack surface, which leaves attackers with fewer ways to perform attacks) What is reduced by hardening an operating system? correct answer attack surface What is used to prevent buffer overflow? correct answer bounds checking (sets a limit on the amount of data an application takes in) When should updates be performed? correct answer After testing and vetting Which action is considered a significant event that should be included in the logging process? correct answer Administrative privilege Which buffer size creates an entry point for a cyberattack when the buffer reaches 8 bytes? correct answer 4 bytes (buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold. At 8 bytes, the established buffer size has been exceeded)
Which port service needs to be removed when running a webserver? correct answer Port 53 (typically blocked on webservers to prevent Domain Name System (DNS) servers from divulging critical information to attackers) Which security mechanism hardens operating systems (OS) by limiting user access to the minimum permissions needed to carry out tasks? correct answer Apply the principle of least privilege Which symmetric encryption algorithm is the standard encryption algorithm used by the US Federal government? correct answer AES Which tool is categorized as an exploit framework? correct answer Core Impact (centralized penetration testing tool that enables security teams to conduct advanced, multi-phased penetration tests. It is a type of tool categorized as an exploit framework. Exploit frameworks include pre-packaged sets of exploits) Which tool is used for port scanning and to discover devices on a network? correct answer Nmap (used for port scanning, discovering devices, and searching for hosts on a network. It is an important tool to help identify and remove unessential services when hardening an operating system) Which tools is used to perform web assessment and analysis? correct answer Burp Suite (web assessment and analysis tool that looks for issues on websites such as cross-site scripting or SQL injection flaws) Which type of analysis tool attacks applications with inputs from a wide variety of sources in the hope that the application will fail or perform in unexpected ways? correct answer Fuzzer (bombards applications with all manner of data and inputs
Which type of vulnerability is present when multiple threads within a process control access to a particular resource? correct answer race condition (occurs when multiple threads within a process control access to a particular resource and the correct handling depends on timing or transactions)