+1-316-444-1378

SHORT ANSWER QUESTIONS (please be very brief)
Suppose the author of an online banking software system has programmed in a secret feature so that program emails him the account information for any account whose balance has just gone over $10000. What kind of attack is this and what are some of its risks?
Answer:
What restrictions are often found in shellcode and how can they be voided.
Answer:
Bobby says that a computer virus ate his homework which was saved as a Word document.
SHORT ANSWER QUESTIONS (please be very brief)
Suppose the author of an online banking software system has programmed in a secret feature so that program emails him the account information for any account whose balance has just gone over $10000. What kind of attack is this and what are some of its risks?
Answer:
What restrictions are often found in shellcode and how can they be voided.
Answer:
Bobby says that a computer virus ate his homework which was saved as a Word document. What kind of virus is the most likely culprit?
Answer:
State some threats that result from a process running with administrative or root privileges on a system.
Answer:
__________ applications is a control that limits the programs that can execute on the system to just those in an explicit list.
Virtualizing
White listing
Logging
Patching
Answer
The range of logging data acquired should be determined _______.
during security testing
as a final step
after monitoring average data flow volume
during the system planning stage
Answer
FILL-IN THE BLANK QUESTIONS
The major advantage of ________ is its simplicity and its freedom from assumptions about the expected input to any program service or function.
Answer:
______ is a reactive control that can only inform you about bad things that have already happened.
_________ are a collection of string values inherited by each process from its parent that can affect the way a running process behaves.
Deadlock
Privileges
Environment variables
Race condition
Attachments:

Categories: Uncategorized