PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

How can you protect/fix the problem of your application as shown above?

Buffer X in an Accounting application module for Brownies Inc. can contain 200 characters. The programmer makes an assumption that 200 characters are more than enough. Because there were no proper boundary checks being conducted, Bob decided to insert 400 characters into the 200-character buffer. (Overflows the buffer). Below is the code snippet.

How can you protect/fix the problem of your application as shown above?

How can you protect/fix the problem of your application as shown above?

Buffer X is an Accounting application module for company can contain 200 characters. The programmer makes an assumption that 200 characters are more than enough. Because there were no proper boundary checks being conducted. Dave decided to insert 400 characters into the 200-character buffer which overflows the buffer. Below is the code snippet:

Void func (void)

{int I; char buffer [200];

for (I=0; I<400; I++)

buffer (I)= `A’;

return;

}

How can you protect/fix the problem of your application as shown above? (Choose two)

How would Jon protect his network form these types of attacks?

John runs a Web Server, IDS and firewall on his network. Recently his Web Server has been under constant hacking attacks. He looks up the IDS log files and sees no Intrusion attempts but the web server constantly locks up and needs rebooting due to various brute force and buffer overflow attacks but still the IDS alerts no intrusion whatsoever.

John become suspicious and views he firewall logs and he notices huge SSL connections constantly hitting web server.

Hackers have been using the encrypted HTTPS protocol to send exploits to the web server and that was the reason the IDS did not detect the intrusions.

How would Jon protect his network form these types of attacks?

What has the Blake just accomplished?

Blake is in charge of securing all 20 of his company’s servers. He has enabled hardware and software firewalls, hardened the operating systems and disabled all unnecessary service on all the servers. Unfortunately, there is proprietary AS400 emulation software that must run on one of the servers that requires the telnet service to function properly. Blake is especially concerned about his since telnet can be a very large security risk in an organization. Blake is concerned about how his particular server might look to an outside attacker so he decides to perform some footprinting scanning and penetration tests on the server. Blake telents into the server and types the following command:

HEAD/HTTP/1.0

After pressing enter twice, Blake gets the following results:

What has the Blake just accomplished? (Exhibit)


Page 478 of 555« First...102030...476477478479480...490500510...Last »