Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

MULTIPLE CHOICE QUESTIONS: 1. In Linux system, a vulnerability is a specific wea

ID: 3804922 • Letter: M

Question

MULTIPLE CHOICE QUESTIONS:

1. In Linux system, a vulnerability is a specific weakness or security-related bug in an application or operating system. A threat is the combination of a vulnerability, an attacker, and _________________.

   A. None of the above                          B. a weakness vector

   C. an attack and vulnerability vector   D. an attack vector

2. A runtime technique that can be used is to place ________ between critical regions of memory in a processes address space.

                        A. guard pages                       B. library functions

                        C. shellcodes                          D. MMUs    

E.   None of the above

3. _______ defenses involve changes to the memory management of the virtual address space of processes that act to either alter the properties of regions of memory or to make predicting the location of target buffers sufficiently difficult to thwart many types of attacks.

                        A. Run-time                           B. Position independent

                        C. Buffer                                D. Compile-time

E.   None of the above

4. Windows Vista and later changes the default; all user accounts are users and not administrators. This is referred to as ______________

User Control Account (UCA.)

Tolerance User Account Control (TUAC.)

Preventive User Account Control (PUAC.)

D. None of the above

5. The most common variant of injecting malicious script content into pages returned to users by the targeted sites is the _________ vulnerability.

                              A. PHP file inclusion                               B. chroot jail

                              C. atomic bomb                                        D. XSS reflection

      E.   None of the above

Explanation / Answer

Please give the thumbs up, If it is helpful for you. Thank you!!

Answer1) D. an attack vector

it is means for the attacker to exploit the vulnerability.

Answer2) A. guard pages

>flagged in memory management unit as illegal addresses.
>any attempted access aborts process

Answer3) C. Buffer

Answer4) Windows Vista and later changes the default; all user accounts are users
and not administrators. This is referred to as User Account Control (UAC.)

Answer 5)  D. XSS reflection

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote