Chapter 9 & 10 Ethical Hacking

Ace your homework & exams now with Quizwiz!

SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?

air gap

Which type of vulnerabilities can result from a server accepting untrusted, unvalidated input?

injection

What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?

BIOS-based rootkit

What programming languages are vulnerable to buffer overflow attacks?

C and C++

Adobe System's ColdFusion uses its proprietary tags, which are written in which of the following languages?

CFML

Which of the following is the interface that determines how a Web server passes data to a Web browser?

CGI

What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android, Windows Mobile, and the Apple iPhone OS?

Java-based

Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?

Mandatory Access Control

Which of the following interfaces is a standard database access method, developed by SQL Access Group, that allows an application to access data stored in a database management system (DBMS)?

ODBC

Which of the following systems should be used when equipment monitoring and automation is critical?

SCADA

When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?

Share-level security

What is the specific act of filtering, rejecting, or sanitizing a user's untrusted input before the application processes it?

input validation

What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT) file system?

no ACL support

Which of the following is considered to be the most critical SQL vulnerability?

null SA password

Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?

router


Related study sets

Possessory Interests - Property Adaptibar Set 1

View Set

Sensory Perception: Disorder of the Eyes and Ears Exam 4

View Set

Chapter 45: PrepU - Nursing Management: Patients With Neurologic Trauma

View Set

NCLEX-PN Pharmacology-Hematological

View Set

Module 11 Textbook & Quiz | ITE-249-02 Wireless Network Security

View Set