Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

C725 WGU CISSP Study Guide 8th Edition Quizzes Latest 2022 Complete Solution Rated A

Beoordeling
-
Verkocht
-
Pagina's
26
Cijfer
A+
Geüpload op
18-06-2022
Geschreven in
2021/2022

C725 WGU CISSP Study Guide 8th Edition Quizzes Latest 2022 Complete Solution Rated A

Instelling
Vak

Voorbeeld van de inhoud

C725 WGU CISSP Study Guide 8th Edition
Quizzes
Signature Detection

Signature detection mechanisms use known descriptions of viruses to identify malicious
code resident on a system.

Domain 3: Security Architecture and Engineering
3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution
elements
Malicious Code - What is the most commonly used technique to protect against virus
attacks?
A Signature detection
B Automated reconstruction
C Data integrity assurance
D Heuristic detection

Backdoor

Back doors are undocumented command sequences that allow individuals with knowledge
of the back door to bypass normal access restrictions.

Domain 3: Security Architecture and Engineering
3.6 Assess and mitigate vulnerabilities in web-based systems
Application Attacks - Ben's system was infected by malicious code that modified the
operating system to allow the malicious code author to gain access to his files. What type of
exploit did this attacker engage in?

A Escalation of privilege
B Back door
C Rootkit
D Buffer overflow

Buffer Overflow

Buffer overflow attacks allow an attacker to modify the contents of a system's memory by
writing beyond the space allocated for a variable.

Domain 3: Security Architecture and Engineering
3.6 Assess and mitigate vulnerabilities in web-based systems
Application Attacks - What type of application vulnerability most directly allows an
attacker to modify the contents of a system's memory?

,A TOC/TOU
B Back door
C Rootkit
D Buffer overflow

Reflected Input

Cross-site scripting attacks are successful only against web applications that include
reflected input.

Domain 8: Software Development Security
8.5 Define and apply secure coding guidelines and standards
Web App Security - What condition is necessary on a web page for it to be used in a cross-
site scripting attack?

A .NET technology
B Database-driven content
C Reflected input
D CGI scripts

Stuxnet

Stuxnet was a highly sophisticated worm designed to destroy nuclear enrichment
centrifuges attached to Siemens controllers.

3.0 Domain 3: Security Architecture and Engineering
3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution
elements
Malicious Code - What worm was the first to cause major physical damage to a facility?
A Melissa
B RTM
C Stuxnet
D Code Red

DMZ (demilitarized zone)

The DMZ (demilitarized zone) is designed to house systems like web servers that must be
accessible from both the internal and external networks.

Domain 8: Software Development Security
8.2 Identify and apply security controls in development environments
Web App Security - You are the security administrator for an e-commerce company and are
placing a new web server into production. What network zone should you use?

A Intranet

, B Sandbox
C Internet
D DMZ

fsas3alG

Except option C, the choices are forms of common words that might be found during a
dictionary attack. mike is a name and would be easily detected. elppa is simply apple
spelled backward, and dayorange combines two dictionary words. Crack and other utilities
can easily see through these "sneaky" techniques. Option C is simply a random string of
characters that a dictionary attack would not uncover.

Domain 3: Security Architecture and Engineering
3.6 Assess and mitigate vulnerabilities in web-based systems
Password Attacks - Which one of the following passwords is least likely to be compromised
during a dictionary attack?

A elppa
B dayorange
C fsas3alG
D mike

Salting

Salting passwords adds a random value to the password prior to hashing, making it
impractical to construct a rainbow table of all possible values.

3.0 Domain 3: Security Architecture and Engineering
3.6 Assess and mitigate vulnerabilities in web-based systems
Password Attacks - What technique may be used to limit the effectiveness of rainbow table
attacks?

A Salting
B Hashing
C Transport encryption
D Digital signatures

Port Scan

Port scans reveal the ports associated with services running on a machine and available to
the public.

3.0 Domain 3: Security Architecture and Engineering
3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution
elements

Geschreven voor

Vak

Documentinformatie

Geüpload op
18 juni 2022
Aantal pagina's
26
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Succeed Havard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1824
Lid sinds
6 jaar
Aantal volgers
1499
Documenten
5755
Laatst verkocht
2 dagen geleden

3.9

293 beoordelingen

5
167
4
34
3
36
2
9
1
47

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen