Page 1503 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1503
C. Digital signatures
D. Transport encryption
10. What character should always be treated carefully when
encountered as user input on a web form?
A. !
B. &
C. *
D. '
11. What database technology, if implemented for web forms, can limit
the potential for SQL injection attacks?
A. Triggers
B. Stored procedures
C. Column encryption
D. Concurrency control
12. What type of reconnaissance attack provides attackers with useful
information about the services running on a system?
A. Session hijacking
B. Port scan
C. Dumpster diving
D. IP sweep
13. What condition is necessary on a web page for it to be used in a
cross-site scripting attack?
A. Reflected input
B. Database-driven content
C. .NET technology
D. CGI scripts
14. What type of virus utilizes more than one propagation technique to

