Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

D430 Section 6 Review Questions WITH Accurate Answers, Exams of Computer Science

D430 Section 6 Review Questions WITH Accurate Answers

Typology: Exams

2024/2025

Available from 07/14/2025

locaz-turus-1
locaz-turus-1 🇺🇸

3.5K documents

1 / 4

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
D430 Section 6 Review Questions
WITH Accurate Answers
What describes a database security issue? correct answer Unauthenticated access
to functionality
What does an organization need to do to the attack surface to protect its devices
and network? correct answer Perform system hardening (an protect an
organization's devices and network, by reduce the attack surface, which leaves
attackers with fewer ways to perform attacks)
What is reduced by hardening an operating system? correct answer attack surface
What is used to prevent buffer overflow? correct answer bounds checking (sets a
limit on the amount of data an application takes in)
When should updates be performed? correct answer After testing and vetting
Which action is considered a significant event that should be included in the
logging process? correct answer Administrative privilege
Which buffer size creates an entry point for a cyberattack when the buffer
reaches 8 bytes? correct answer 4 bytes (buffer overflow occurs when a program
or process attempts to write more data to a fixed-length block of memory, or
buffer, than the buffer is allocated to hold. At 8 bytes, the established buffer size
has been exceeded)
pf3
pf4

Partial preview of the text

Download D430 Section 6 Review Questions WITH Accurate Answers and more Exams Computer Science in PDF only on Docsity!

D430 Section 6 Review Questions

WITH Accurate Answers

What describes a database security issue? correct answer Unauthenticated access to functionality What does an organization need to do to the attack surface to protect its devices and network? correct answer Perform system hardening (an protect an organization's devices and network, by reduce the attack surface, which leaves attackers with fewer ways to perform attacks) What is reduced by hardening an operating system? correct answer attack surface What is used to prevent buffer overflow? correct answer bounds checking (sets a limit on the amount of data an application takes in) When should updates be performed? correct answer After testing and vetting Which action is considered a significant event that should be included in the logging process? correct answer Administrative privilege Which buffer size creates an entry point for a cyberattack when the buffer reaches 8 bytes? correct answer 4 bytes (buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold. At 8 bytes, the established buffer size has been exceeded)

Which port service needs to be removed when running a webserver? correct answer Port 53 (typically blocked on webservers to prevent Domain Name System (DNS) servers from divulging critical information to attackers) Which security mechanism hardens operating systems (OS) by limiting user access to the minimum permissions needed to carry out tasks? correct answer Apply the principle of least privilege Which symmetric encryption algorithm is the standard encryption algorithm used by the US Federal government? correct answer AES Which tool is categorized as an exploit framework? correct answer Core Impact (centralized penetration testing tool that enables security teams to conduct advanced, multi-phased penetration tests. It is a type of tool categorized as an exploit framework. Exploit frameworks include pre-packaged sets of exploits) Which tool is used for port scanning and to discover devices on a network? correct answer Nmap (used for port scanning, discovering devices, and searching for hosts on a network. It is an important tool to help identify and remove unessential services when hardening an operating system) Which tools is used to perform web assessment and analysis? correct answer Burp Suite (web assessment and analysis tool that looks for issues on websites such as cross-site scripting or SQL injection flaws) Which type of analysis tool attacks applications with inputs from a wide variety of sources in the hope that the application will fail or perform in unexpected ways? correct answer Fuzzer (bombards applications with all manner of data and inputs

Which type of vulnerability is present when multiple threads within a process control access to a particular resource? correct answer race condition (occurs when multiple threads within a process control access to a particular resource and the correct handling depends on timing or transactions)