946
Chapter 21
■
Malicious
Code and Application Attacks
7.
What type of application vulnerability most directly allows
an attacker to modify the
contents of a system’s memory?
A.
Rootkit
B.
Back door
C.
TOC/TOU
D.
Buffer overflow
8.
Which one of the following passwords is least likely to be compromised
during a dictionary
attack?
A.
mike
B.
elppa
C.
dayorange
D.
fsas3alG
9.
What technique may be used to limit the effectiveness of rainbow table attacks?
A.
Hashing
B.
Salting
C.
Digital signatures
D.
Transport encryption
10.
What character should always be treated carefully when encountered
as user input on a web
form?
A.
!
B.
&
C.
*
D.
'
11.
What
database technology,
if implemented for web forms, can
limit the potential for SQL
injection attacks?
Do'stlaringiz bilan baham: