The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 3 Days Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Service packs are a useful techniques for hardening an operating system.
Question 8 options:| True |
| False |
Save
Question 9 (5 points)
Virtualization offers many benefits, including all of the following EXCEPT:
Question 9 options:|
Adding layers of technology. |
|
Allowing usage of applications that can only run on older versions of an operating system. |
|
Desktop virtualization. |
|
Operational efficiency. |
Save
Question 10 (5 points)
A Back Door a piece of software, a command, or a methodology that attacks a particular security vulnerability.
Question 10 options:| True |
| False |
Save
Question 11 (5 points)
One benefit of virtualizing a server is the creation of a sandbox environment.
Question 11 options:| True |
| False |
Save
Question 12 (5 points)
The three (3) components of Access Control are:
Question 12 options:|
Confidentiality, Integrity, Availability |
|
Identification, Matching, Authorization |
|
Identification, Authentication, Authorization |
|
Authorization, Access, Availability |
Save
Question 13 (5 points)
SQL injection must exploit a security vulnerability in an application's software.
Question 13 options:| True |
| False |
Save
Question 14 (5 points)
Linux and Unix are fundamentally divided into two parts: the kernel and user space. Most programs execute in user space (on top of the kernel).
Question 14 options:| True |
| False |
Save
Question 15 (5 points)
In hosted virtualization the hypervisor runs directly on the underlying hardware, without a host OS; the hypervisor can even be built into the computer’s firmware.
Question 15 options:| True |
| False |
Save
Question 16 (5 points)
What is phishing? What risks and threats does phishing pose to information assurance?
Question 16 options:
Save
Question 17 (5 points)
Most Unix systems do not support a “thread” as a separate concept.
Question 17 options:| True |
| False |
Save
Question 18 (5 points)
According to SANS, incorrect authorization is a form of social engineering.
Question 18 options:| True |
| False |
Save
Question 19 (5 points)
Which of the following exists when changes to the order of two or more events can cause a change in behavior?
Question 19 options:|
Unvalidated input |
|
Interprocess communication |
|
Insecure file operations |
|
Race conditions |
Save
Question 20 (5 points)
What is buffer overflow? What is stack overflow or stack smashing?
----------- ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly