1. Your organization has experienced several security issues in the past year, and management has adopted a plan to periodically assess its information security awareness. You have been asked to lead this program. Which program are you leading?
A) continuous monitoring B) threat identification C) risk mitigation D) security training
2. Which of the following is the process of using a programming tool to not only identify syntactic problems in code but also discover weaknesses that can lead to memory leaks and buffer overflows?
A) fuzzing B) debugging C) sandboxing D) dumping
3. Which of the following is not a single protocol but a frameworkfor port-based access control?
A) CHAP B) EAP C) PAP D) RDP
4. The following is what type of attack?#includechar *code = 'AAAABBBBCCCCDDD'; //including the character ' 'size = 16 bytesvoid main(){char buf[8];strcpy(buf,code);
A) CSRF B) buffer overflow C) SQL injection D) XSS
5. Which of the following is used to manage a device using Telnet?
A) data interface B) USB C) management interface D) Bluetooth
1. Right Answer: A Explanation: You are leading the continuous monitoring program, which will periodically assess its information security awareness. A security training program designs and delivers security training at all levels of the organization. A risk mitigation program attempts to identify risks and select and deploy mitigating controls. A threat identification identifies all threats to an organization as part of risk management.
2. Right Answer: B Explanation: Runtime debugging is the process of using a programming tool to not only identify syntactic problems in code but also discover weaknesses that can lead to memory leaks and buffer overflows. Runtime debugging tools operate by examining and monitoring the use of memory.
3. Right Answer: B Explanation: Extensible Authentication Protocol (EAP) is not a single protocol but a framework for port-based access control that uses the same three components as RADIUS.
4. Right Answer: B Explanation: In this example of a buffer overflow, 16 characters are being sent to a buffer that is only 8 bytes. With proper input validation, this will cause an access violation.
5. Right Answer: C Explanation: Management interfaces are used for accessing a device remotely. Typically, a management interface is disconnected from the in-band network and is connected to the device s internal network. Through a management interface, you can access the device over the network by using utilities such as SSH and Telnet. SNMP can use the management interface to gather statistics from the device.
Leave a comment