Page 1502 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1502
5. What advanced virus technique modifies the malicious code of a
virus on each system it infects?
A. Polymorphism
B. Stealth
C. Encryption
D. Multipartitism
6. Which one of the following tools provides a solution to the problem
of users forgetting complex passwords?
A. LastPass
B. Crack
C. Shadow password files
D. Tripwire
7. What type of application vulnerability most directly allows an
attacker to modify the contents of a system’s memory?
A. Rootkit
B. Back door
C. TOC/TOU
D. Buffer overflow
8. Which one of the following passwords is least likely to be
compromised during a dictionary attack?
A. mike
B. elppa
C. dayorange
D. fsas3alG
9. What technique may be used to limit the effectiveness of rainbow
table attacks?
A. Hashing
B. Salting

