which of the following application attacks?
Failure to validate the size of a variable before writing it to memory could result in which of the following
application attacks?
Which of the following has the potential to cause the M…
An administrator was asked to review user accounts. Which of the following has the potential to cause the
MOST amount of damage if the account was compromised?
Which of the following BEST describes this attack?
The Chief Executive Officer (CEO) receives a suspicious voice mail warning of credit card fraud. No one else
received the voice mail. Which of the following BEST describes this attack?
Which of the following BEST describes the compromised s…
An administrator is investigating a system that may potentially be compromised, and sees the following log
entries on the router.
*Jul 15 14:47:29.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) -> 10.10.1.5
(6667), 3 packets.
*Jul 15 14:47:38.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) -> 10.10.1.5
(6667), 6 packets.
*Jul 15 14:47:45.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) -> 10.10.1.5
(6667), 8 packets.
Which of the following BEST describes the compromised system?
Which of the following devices is used for the transpar…
Which of the following devices is used for the transparent security inspection of network traffic by redirecting
user packets prior to sending the packets to the intended destination?
Which of the following describes this?
On a train, an individual is watching a proprietary video on Joe’s laptop without his knowledge.
Which of the following describes this?
The security administrator is determining the:
A set of standardized system images with a pre-defined set of applications is used to build end-user
workstations. The security administrator has scanned every workstation to create a current inventory of all
applications that are installed on active workstations and is documenting which applications are out-of-date and
could be exploited. The security administrator is determining the:
Which of the following is the developer performing when…
A software development company has hired a programmer to develop a plug-in module to an existing
proprietary application. After completing the module, the developer needs to test the entire application to ensure
that the module did not introduce new vulnerabilities. Which of the following is the developer performing when
testing the application?
Which of the following types of testing is this an exam…
An IT auditor tests an application as an authenticated user.
Which of the following types of testing is this an example of?
Which of the following reviews should Jane conduct?
Pete, a developer, writes an application. Jane, the security analyst, knows some things about the overall
application but does not have all the details. Jane needs to review the software before it is released to
production. Which of the following reviews should Jane conduct?