56.
In what type of attack does the attacker place more
information in a memory location than is allocated for that use?
- A.SQL injection
- B.LDAP injection
- C.Cross-site scripting
- D.Buffer overflow
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Buffer overflow attacks occur when an attacker manipulates a program into placing more data into an area of memory than is allocated for that program’s use. The goal is to overwrite other information in memory with instructions that may be executed by a different process running on the system. |
57.
The Dirty COW attack is an example of what type of
vulnerability?
- A.Malicious code
- B.Privilege escalation
- C.Buffer overflow
- D.LDAP injection
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
In October 2016, security researchers announced the discovery of a Linux kernel vulnerability dubbed Dirty COW. This vulnerability, present in the Linux kernel for nine years, was extremely easy to exploit and provided successful attackers with administrative control of affected systems. |
58.
Which one of the following protocols should never be used
on a public network?
- A.SSH
- B.HTTPS
- C.SFTP
- D.Telnet
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Telnet is an insecure protocol that does not make use of encryption. The other protocols mentioned are all considered secure. |
59.
Betty is selecting a transport encryption protocol for use in a
new public website she is creating. Which protocol would be the
best choice?
- A.SSL 2.0
- B.SSL 3.0
- C.TLS 1.0
- D.TLS 1.1
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
TLS 1.1 is a secure transport protocol that supports web traffic. The other protocols listed all have flaws that render them insecure and unsuitable for use. |
60.
Which one of the following conditions would not result in a
certificate warning during a vulnerability scan of a web server?
- A.Use of an untrusted CA
- B.Inclusion of a public encryption key
- C.Expiration of the certificate
- D.Mismatch in certificate name
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Digital certificates are intended to provide public encryption keys, and this would not cause an error. The other circumstances are all causes for concern and would trigger an alert during a vulnerability scan. |