Practice Test 5 Flashcards
What is the best countermeasure against social engineering?
AAA protocols
User authentication
Strong passwords
User education
User education
Which of the following violates the principle of least privilege?
Onboarding process
Improperly configured accounts
Shared accounts for privileged users
Time-of-day restrictions
Improperly configured accounts
An e-commerce store app running on an unpatched web server is an example of:
Architecture/design weakness
Risk acceptance
Vulnerable business process
Security through obscurity
Vulnerable business process
The purpose of a downgrade attack is to make a computer system fall back to a weaker security mode which makes the system more vulnerable to attacks.
True
False
True
A situation in which an application fails to properly release memory allocated to it or continually requests more memory than it needs is called:
Memory leak
Buffer overflow
DLL injection
Integer overflow
Memory leak
Which of the terms listed below describes a programming error where an application tries to store a numeric value in a variable that is too small to hold it?
Buffer overflow
Pointer dereference
Memory leak
Integer overflow
Integer overflow
A situation in which an application writes to or reads from an area of memory that it is not supposed to access is referred to as:
DLL injection
Buffer overflow
Memory leak
Integer overflow
Buffer overflow
Which of the following terms describes an attempt to read a variable that stores a null value?
Integer overflow
Pointer dereference
Buffer overflow
Memory leak
Pointer dereference
A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources is known as:
DLL
ISO
EXE
INI
DLL
A dynamic link library (DLL) is a shared program module with ordered code, methods, functions, enums and structures that may be dynamically called by an executing program during run time. ADLLusually has a file extension ending in .dll.
Which of the terms listed below describes a type of attack that relies on executing a library of code?
Memory leak
DLL injection
Pointer dereference
Buffer overflow
DLL injection
“In the IT industry, the term ““System sprawl”” is used to describe poor hardware resource utilization.”
True
False
True
An effective asset management process provides countermeasures against: (Select all that apply)
System sprawl Race conditions Undocumented assets Architecture and design weaknesses User errors
System sprawl
Undocumented assets
Architecture and design weaknesses
Zero-day attack exploits:
New accounts
Patched software
Vulnerability that is present in already released software but unknown to the software developer
Well known vulnerability
Vulnerability that is present in already released software but unknown to the software developer
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called:
Antivirus
Firewall
Antispyware
Malware
Firewall
Which of the following applies to a request that doesn’t match the criteria defined in an ACL?
Group policy
Implicit deny rule
Transitive trust
Context-aware authentication
Implicit deny rule