Page 1502 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1502

5.  What advanced virus technique modifies the malicious code of a
                    virus on each system it infects?

                    A.  Polymorphism


                    B.  Stealth

                    C.  Encryption

                    D.  Multipartitism

                6.  Which one of the following tools provides a solution to the problem
                    of users forgetting complex passwords?

                    A.  LastPass

                    B.  Crack

                    C.  Shadow password files

                    D.  Tripwire

                7.  What type of application vulnerability most directly allows an

                    attacker to modify the contents of a system’s memory?

                    A.  Rootkit

                    B.  Back door

                    C.  TOC/TOU

                    D.  Buffer overflow

                8.  Which one of the following passwords is least likely to be
                    compromised during a dictionary attack?

                    A.  mike

                    B.  elppa


                    C.  dayorange

                    D.  fsas3alG

                9.  What technique may be used to limit the effectiveness of rainbow
                    table attacks?

                    A.  Hashing

                    B.  Salting
   1497   1498   1499   1500   1501   1502   1503   1504   1505   1506   1507