PDF Download
FREE AND STUDY GAMES ABOUT COM FINAL EXAM
QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -104 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: (BLANK) attacks attempt to bypass the browser's security checks to gain elevated access privileges to sensitive data belonging to another site
Answer:
Cross-site scripting Question 2: (BLANK) can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it
Answer:
New injection attacks variants Question 3: A (BLANK) interconnects the IoT-enabled devices with the higher-level communication networks
Answer:
gateway
Question 4: The needs and policy relating to backup and archive should be determined (BLANK)
Answer:
during the system planning stage Question 5: (BLANK) recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, employ authentication mechanisms, and offer subscribers sufficient visibility about mechanisms [...]
Answer:
NIST Question 6: The potential for a buffer overflow exists anywhere that data is copied or merged into a (BLANK), where at least some of the data are read from outside the program
Answer:
buffer Question 7: Once the system is appropriately built, secured, and deployed, the process of maintaining security is (BLANK)
Answer:
continuous Question 8: (BLANK) are a collection of string values inherited by each process from its parent that can affect the way a running process behaves
Answer:
Environment variables Question 9: "Incorrect Calculation of Buffer Size" is in the (BLANK) software error category
Answer:
Risky Resource Management Question 10: A (BLANK) can potentially bypass many security controls to install malware
Answer:
malicious driver
Question 11: A(n) (BLANK) character can be encoded as a 1 to 4 byte sequence using the UTF-8 encoding
Answer:
Unicode Question 12: The intent of (BLANK) is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately
Answer:
fuzzing
Question 13: (BLANK) attacks are one of the most common attacks seen
Answer:
buffer overflow attacks Question 14: (BLANK) has two operating modes, one tailored for single-source communication, and another tailored for multi-source broadcast communication
Answer:
MiniSec Question 15: (BLANK) applications is a control that limits the programs that can execute on the system to just those in an explicit list
Answer:
white-list applications Question 16: Software (BLANK) is closely related to software quality and reliability
Answer:
Software security Question 17: (BLANK) is a tool used to automatically identify potentially vulnerable programs
Answer:
fuzzing
Question 18: Defensive programming is sometimes referred to as (BLANK)
Answer:
Secure Programming
Question 19: The core of (BLANK) is the implementation of intrusion detection systems and intrusion prevention systems at entry points to the cloud and on servers in the cloud
Answer:
Intrusion management Question 20: A (BLANK) cloud provides service to customers in the form of a platform on which the customer's applications can run
Answer:
PaaS
Question 21: Most large software systems (BLANK) have security weaknesses
Answer:
will Question 22: A (BLANK) is a pattern composed of a sequence of characters that describe allowable input variants
Answer:
regular expression Question 23: The term (BLANK) has generally meant a package of security services offered by a service provider that offloads much of the security responsibility from an enterprise to the security service provider
Answer:
security as a service (SaaS) Question 24: (BLANK) systems should not run automatic updates because they may possibly introduce instability
Answer:
Change controlled Question 25: A stack overflow can result in some form of a (BLANK) attack on a system
Answer:
denial-of-service