Page 1503 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1503

C.  Digital signatures

                    D.  Transport encryption

              10.  What character should always be treated carefully when
                    encountered as user input on a web form?


                    A.  !

                    B.  &

                    C.  *

                    D.  '

               11.  What database technology, if implemented for web forms, can limit
                    the potential for SQL injection attacks?

                    A.  Triggers

                    B.  Stored procedures


                    C.  Column encryption
                    D.  Concurrency control


               12.  What type of reconnaissance attack provides attackers with useful
                    information about the services running on a system?

                    A.  Session hijacking

                    B.  Port scan

                    C.  Dumpster diving

                    D.  IP sweep

               13.  What condition is necessary on a web page for it to be used in a
                    cross-site scripting attack?

                    A.  Reflected input


                    B.  Database-driven content

                    C.  .NET technology

                    D.  CGI scripts

               14.  What type of virus utilizes more than one propagation technique to
   1498   1499   1500   1501   1502   1503   1504   1505   1506   1507   1508