CYSE 101 Final Exam Jones | 60 Questions with 100% Correct Answers
0 view 0 purchase
Course
CYSE 101
Institution
Western Governors University
How does the principle of least privilege apply to operating system hardening? - prevents attack actions that require administrator or root privilege What is the difference between a port scanner and a vulnerability assessment tool? - port scanners discover listening ports; vulnerability assessment...
cyse 101 final exam jones | 60 questions with 100 correct answers
Written for
Western Governors University
CYSE 101
All documents for this subject (10)
Seller
Follow
Classroom
Reviews received
Content preview
CYSE 101 Final Exam Jones | 60 Questions with
100% Correct Answers
How does the principle of least privilege apply to operating system hardening? Correct Answer:
prevents attack actions that require administrator or root privilege
What is the difference between a port scanner and a vulnerability assessment tool? Correct
Answer: port scanners discover listening ports; vulnerability assessment tools report known
vulnerabilities on listening ports
What does applying a vendor OS update (patch) usually do? Correct Answer:
What does executable space protection do for us and how? Correct Answer: prevents buffer
overflow attacks from working by blocking code execution on the memory stack
If an antivirus tool is looking for specific bytes in a file (e.g., hex 50 72 6F etc.) to label it
malicious, what type of AV detection is this? Correct Answer: signature
Which of the following is not part of operating system hardening? Correct Answer: Changing
the main network firewall ruleset
Why might we want a (software) firewall (FW) on our host if one already exists on the network?
Correct Answer: host FWs know more about the local system
Are nmap results always accurate, or is it sometimes necessary to verify nmap output with
another tool? Correct Answer: you should verify nmap results with another tool or data source
Exploit frameworks make it... Correct Answer: easier for amateurs to launch cyber attacks
What is a cyber attack surface? Correct Answer: the total of the number of available avenues
through which our system might be attacked
What does a fuzzing tool do? Correct Answer: Provide multiple data and inputs to discover
vulnerabilities
What does the tool Nikto do? Correct Answer: Scans a web server for common vulnerabilities
Why is input validation important from a security perspective? Correct Answer: to prevent
certain types of attacks
How can we prevent buffer overflows in our applications? Correct Answer: implement proper
bounds checking
Does an SQL injection attack compromise content in the database or content in the Web
application? Correct Answer: database
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $5.49. You're not tied to anything after your purchase.