Transcender Sec + Tests 2 Flashcards
Which of these issues may result from poor programming processes? (Choose all that apply.) A) Integer overflow B) Pointer dereference C) Memory leak D) Buffer overflow
All of the listed options may result from poor programming processes.
A hacker has used a design flaw in an application to obtain unauthorized access to the application. Which type of attack has occurred?
A) maintenance hook
B) backdoor
C) escalation of privileges
D) buffer overflow
C) escalation of privileges
As part of your company’s comprehensive vulnerability scanning policy, you decide to perform a passive vulnerability scan on one of your company’s subnetworks. Which statement is true of this scan?
A) It impacts the hosts and network less than other scan types.
B) It includes the appropriate permissions for the different data types.
C) It allows a more in-depth analysis than other scan types.
D) It is limited to a particular operating system.
A passive scan impacts the hosts and network less than other scan types. A passive scan is a non-intrusive scan, meaning you are probing for the weaknesses but not exploiting them.