Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

C725 WGU CISSP Study Guide 8th Edition Quizzes With Complete Solution

Rating
-
Sold
-
Pages
25
Grade
A+
Uploaded on
16-06-2022
Written in
2021/2022

C725 WGU CISSP Study Guide 8th Edition Quizzes With Complete Solution

Institution
Course

Content preview

C725 WGU CISSP Study Guide 8th Edition Quizzes
Signature Detection

Signature detection mechanisms use known descriptions of viruses to identify malicious code resident
on a system.

Domain 3: Security Architecture and Engineering
3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
Malicious Code Correct Answer: What is the most commonly used technique to protect against virus
attacks?
A Signature detection
B Automated reconstruction
C Data integrity assurance
D Heuristic detection

Backdoor

Back doors are undocumented command sequences that allow individuals with knowledge of the back
door to bypass normal access restrictions.

Domain 3: Security Architecture and Engineering
3.6 Assess and mitigate vulnerabilities in web-based systems
Application Attacks Correct Answer: Ben's system was infected by malicious code that modified the
operating system to allow the malicious code author to gain access to his files. What type of exploit did
this attacker engage in?

A Escalation of privilege
B Back door
C Rootkit
D Buffer overflow

Buffer Overflow

Buffer overflow attacks allow an attacker to modify the contents of a system's memory by writing
beyond the space allocated for a variable.

Domain 3: Security Architecture and Engineering
3.6 Assess and mitigate vulnerabilities in web-based systems
Application Attacks Correct Answer: What type of application vulnerability most directly allows an
attacker to modify the contents of a system's memory?

A TOC/TOU
B Back door
C Rootkit
D Buffer overflow

,Reflected Input

Cross-site scripting attacks are successful only against web applications that include reflected input.

Domain 8: Software Development Security
8.5 Define and apply secure coding guidelines and standards
Web App Security Correct Answer: What condition is necessary on a web page for it to be used in a
cross-site scripting attack?

A .NET technology
B Database-driven content
C Reflected input
D CGI scripts

Stuxnet

Stuxnet was a highly sophisticated worm designed to destroy nuclear enrichment centrifuges attached
to Siemens controllers.

3.0 Domain 3: Security Architecture and Engineering
3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
Malicious Code Correct Answer: What worm was the first to cause major physical damage to a facility?
A Melissa
B RTM
C Stuxnet
D Code Red

DMZ (demilitarized zone)

The DMZ (demilitarized zone) is designed to house systems like web servers that must be accessible
from both the internal and external networks.

Domain 8: Software Development Security
8.2 Identify and apply security controls in development environments
Web App Security Correct Answer: You are the security administrator for an e-commerce company and
are placing a new web server into production. What network zone should you use?

A Intranet
B Sandbox
C Internet
D DMZ

fsas3alG

Except option C, the choices are forms of common words that might be found during a dictionary attack.
mike is a name and would be easily detected. elppa is simply apple spelled backward, and dayorange
combines two dictionary words. Crack and other utilities can easily see through these "sneaky"
techniques. Option C is simply a random string of characters that a dictionary attack would not uncover.

, Domain 3: Security Architecture and Engineering
3.6 Assess and mitigate vulnerabilities in web-based systems
Password Attacks Correct Answer: Which one of the following passwords is least likely to be
compromised during a dictionary attack?

A elppa
B dayorange
C fsas3alG
D mike

Salting

Salting passwords adds a random value to the password prior to hashing, making it impractical to
construct a rainbow table of all possible values.

3.0 Domain 3: Security Architecture and Engineering
3.6 Assess and mitigate vulnerabilities in web-based systems
Password Attacks Correct Answer: What technique may be used to limit the effectiveness of rainbow
table attacks?

A Salting
B Hashing
C Transport encryption
D Digital signatures

Port Scan

Port scans reveal the ports associated with services running on a machine and available to the public.

3.0 Domain 3: Security Architecture and Engineering
3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
Reconnaissance Attacks Correct Answer: What type of reconnaissance attack provides attackers with
useful information about the services running on a system?

A Dumpster diving
B Port scan
C Session hijacking
D IP sweep

LastPass

LastPass is a tool that allows users to create unique, strong passwords for each service they use without
the burden of memorizing them all.

3.0 Domain 3: Security Architecture and Engineering
3.6 Assess and mitigate vulnerabilities in web-based systems

Written for

Course

Document information

Uploaded on
June 16, 2022
Number of pages
25
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$16.50
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Classroom NURSING
Follow You need to be logged in order to follow users or courses
Sold
4874
Member since
4 year
Number of followers
3232
Documents
55394
Last sold
1 day ago
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Read more Read less
4.0

1185 reviews

5
624
4
216
3
196
2
40
1
109

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions