Which of the following is most likely to pose a security threat to a Web server?
A. CGI scripts
B. Database connections
C. Flash or Silverlight animation files
D. LDAP servers
Which of the following organizations provides regular updates concerning security breaches and issues?
A. IETF
B. ISO
C. ICANN
D. CERT
Which of the following is the most likely first step to enable a server to recover from a denial-of- service attack in which all hard disk data is lost?
A. Enable virtualization
B. Contact the backup service
C. Contact a disk recovery service
D. Rebuild your RAID 0 array
Which of the following will best help you ensure a database server can withstand a recently discovered vulnerability?
A. Updating the company vulnerability scanner and conducting a new scan
B. Adding a buffer overflow rule to the intrusion detection system
C. Reconfiguring the firewall
D. Installing a system update
Which of the following is a common problem, yet commonly overlooked, in regards to physical security in server rooms?
A. Firewalls that do not have a dedicated backup
B. False ceilings
C. Logic bombs
D. Biometric malfunctions
Which tool is best suited for identifying applications and code on a Web server that can lead to a SQL injection attack?
A. A vulnerability scanner
B. A packet sniffer
C. An intrusion-detection system
D. A network switch
Which of the following applications can help determine whether a denial-of-service attack is occurring against a network host?
A. Thenetstat command and a packet sniffer
B. Theps command and a network scanner
C. The ping command and User Manager
D. Theiptables command and Windows desktop firewall
You have just deployed an application that uses hash-based checksums to monitor changes in the configuration scripts of a database server that is accessible via the Internet. Which of the following is a primary concern for this solution?
A. The extra hard disk space required to store the database of checksums
B. The amount of memory remaining now that the checksum-based application is running
C. The possibility of a bufferoverflow attack leading to a security breach
D. The security of the checksum database on a read-only media format
Which of the following activities is the most effective at keeping the actions of nae end users from putting the company's physical and logicalWhich of the following activities is the most effective at keeping the actions of na?e end users from putting the company's physical and logical resources at risk?
A. Configuring network intrusion-detection software to monitor end user activity
B. Conducting a training session at the time of hire
C. Reconfiguring the network firewall
D. Assembling a team of security professionals to monitor the network
Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. Which type of attack is this?
A. Brute force
B. Denial of service
C. Botnet
D. Buffer overflow