Question: MULTIPLE CHOICE QUESTIONS: 1. In Linux system, a vulnerability is a specific weakness or security-related bug in an application or operating system. A threat is

MULTIPLE CHOICE QUESTIONS:

1. In Linux system, a vulnerability is a specific weakness or security-related bug in an application or operating system. A threat is the combination of a vulnerability, an attacker, and _________________.

A. None of the above B. a weakness vector

C. an attack and vulnerability vector D. an attack vector

2. A runtime technique that can be used is to place ________ between critical regions of memory in a processes address space.

A. guard pages B. library functions

C. shellcodes D. MMUs

E. None of the above

3. _______ defenses involve changes to the memory management of the virtual address space of processes that act to either alter the properties of regions of memory or to make predicting the location of target buffers sufficiently difficult to thwart many types of attacks.

A. Run-time B. Position independent

C. Buffer D. Compile-time

E. None of the above

4. Windows Vista and later changes the default; all user accounts are users and not administrators. This is referred to as ______________

User Control Account (UCA.)

Tolerance User Account Control (TUAC.)

Preventive User Account Control (PUAC.)

D. None of the above

5. The most common variant of injecting malicious script content into pages returned to users by the targeted sites is the _________ vulnerability.

A. PHP file inclusion B. chroot jail

C. atomic bomb D. XSS reflection

E. None of the above

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!