1
CORRECT WELL DETAILED ANSWERS|LATEST
PASS Which type of intrusion detection system (IDS) is used to analyze activities on the network interface of a particular asset? - ANSWER Host-based
Which security mechanism hardens operating systems (OS) by limiting user access to the minimum permissions needed to carry out tasks? - ANSWER Apply the principle of least privilege
Which tool is used for port scanning and to discover devices on a network? - ANSWER Nmap (used for port scanning, discovering devices, and searching for hosts on a network. It is an important tool to help identify and remove unessential services when hardening an operating system)
What is reduced by hardening an operating system? - ANSWER attack surface
What is used to prevent buffer overflow? - ANSWER bounds checking (sets a limit on the amount of data an application takes in)
Which type of vulnerability is present when multiple threads within a process control access to a particular resource? - ANSWER race condition (occurs when multiple threads within a process control access to a particular resource and the correct handling depends on timing or transactions)
Which type of attack occurs when certain print functions within a programming language are used to manipulate and view the internal memory of an application? - ANSWER format string (these attacks occur when certain print functions within a programming language can be used to manipulate or view the internal memory of an application)
- / 1