logo image

Security Review #3

You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this
Client-side scripts.
Which of the following attacks is a form of software exploitation that transmits or submits a longer stream of data than the input variable is designed to handle
Buffer Overflow.
A programmer that fails to check the length of input before processing leaves his code vulnerable to what form of common attack
Buffer Overflow.
Which of the following is an attack that injects malicious scripts into web pages to redirect users to fake websites or gather personal information
XSS.
When you browse to a website, a pop-up window tells you that your computer has been infected with a virus. You click on the window to see what the problem is. Later, you find out that the window has installed spyware on your system. What type of attack has occurred
Drive-by download.
Which of the following are subject to SQL injection attacks
Database Servers.
You have a website that accepts input from users for creating customer accounts. Input on the form is passed to a database server where the user account information is stored. An attacker is able to insert database commands in the input fields and have those commands execute on the server. Which type of attack has occurred
SQL injection.
Which of the following methods should you use to prevent SQL injection attacks
Perform input validation.
Use of which of the following is a possible violation of privacy
Cookies.
Which of the following is not true regarding cookies
They operate within a security sandbox.
Which type of malicious activity can be described as numerous unwanted and unsolicited e-mail messages sent to a wide range of victims
Spamming.
You want to use an encryption protocol for encrypting Internet phone calls, Which protocol would you choose
PGP Pretty Good Privacy.
Which of the following mechanisms can you use to add encryption to e-mail (Select two.)
PGP S/MIME.
What common design feature among Instant Messaging clients make them more insecure than other means of communication over the Internet
peer-to-peer networking.
What type of attack is most likely to succeed against communications between Instant Messaging clients
Sniffing.
Instant Messaging does not provide which of the following
Privacy.
Which of the following are disadvantages to server virtualization
A compromise of the host system might affect multiple servers.
You have a development machine that contains sensitive information relative to your business. You are concerned that spyware and malware installed while browsing websites could compromise your system or pose a confidential risk
run the browser in a virtual environment.
which of the following is an advantage of a virtual browser
protects agains malicious downloads.
which of the following are advantages of virtualization
centralized admin easy migration of systems to different hardware.
which of the following will enter random data to the inputs of an application
Fuzzing.
which of the following is specifically meant to ensure that a program operates on clean, correct and useful data
Input validation.
What is the primary security feature that can be designed into a network’s infrastructure to protect and support availability
redundancy.
which form of alternate site is the cheapest but may not allow an organization to recover before reaching their maximum tolerable downtime
reciprocal agreement
Which of the following network strategies connects multiple servers together such that if one server fails, the others immediately take over its tasks, preventing a disruption in service
Clustering
Even if you perform regular backups,what must be done to protect it
Regularly test restoration procedures.
why should backup media be stored offsite
to prevent the same disaster from affecting both the network and the backup media.
A system failure has occurred, which of the following restoration processes would result in the fastest restoration of all data to its most current state
Restore the full backup and the last differential backup
Which of the following are backed up during a incremental backup
Only files that have changed since the last full or incremental backup.
Which of the following are backed up during a differential backup
Only files that have changed since the last full backup.
To increase your ability to recover from a disaster, where should you store backup tapes
At the vice president’s home.
You would like to implement bit locker to encrypt data on a hard disk even if it is moved to another system.
enable the TPM in the bios.
You want to protect data on hard drives for users with laptops You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special drive is inserted
Implement Bitlocker with a TPM
Which of the following security measures encrypts the entire contents of a hard drive
Drivelock
You want a security solution that protects the entire hard drive, preventing
Bitlocker
which of the following security solutions would prevent a user from reading a file which she did not create
EFS
You create a new document and save it to a hard drive on a file server on your company’s network Then, you employ an encryption tool to encrypt the file using AES. This activity is an example of what security goal
Confidentiality
You are purchasing a hard disk over the internet from an online retailer, what does your browser use to ensure that others can’t see your private information
SSL
IPsec is implemented by which two separate protocols
ah & esp
Which of the following network layer protocols provides authentication and encryption services for IP based network traffic
IPSec.
You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the information you ned
vulnerability scanner.
You want to make sure that a set of servers will only accept traffic for specific
Port scanner
which of the following identifies standards and xml formats for reporting and analyzing system vulnerabilities
OVAL
You are using a vulnerability scanner that conforms to the oval specifications. which of the following items contains specific vulnerability or security issue that could be prevented on a system
Definition
Which of the following identifies an operating system or network service based on Icmp responses
fingerprinting.
which of the following uses hacking techniques to proactively discover internal vulnerabilities
Penetration testing
you have double blind pen test which of the following actions would you preform first
Inform senior management
what is the main difference between vulnerability scanning and penetration testing
Vulnerability scanning is performed within the security perimeter; pen testing is performed outside of the security perimeter.
What is the primary purpose of pen testing?
test the effectiveness of your security perimeter.
Which of the following types of pen test teams will provide you information that is most revealing of a real-world hacker attack
zero knowledge team.
Which phase or step of a security assessment is a passive activity
Reconnosence
You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. which tool should you use
Protocol analyzer
You want to know what protocols are being used on your network. You’d like to monitor network traffic and sort traffic based on protocol, which tool should you use
packet sniffer
You want to use a tool to see packets on a network, including the source and destination of each packet which tool should you use
Wireshark
You are concerned about attacks directed against the firewall on your network. You would like to examine the content of individual frames sent to the firewall, Which tool should you use
Packet sniffer.
You have recently reconfigured FTP to require encryption of both passwords and data transfers, you would like to check network traffic to verify that all ftp passwords and data are being encrypted which tool should you use
Protocol analyzer

Need essay sample on "Security Review #3"? We will write a custom essay sample specifically for you for only .90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy