Page 1504 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1504

maximize the number of penetrated systems?

                    A.  Stealth virus


                    B.  Companion virus
                    C.  Polymorphic virus


                    D.  Multipartite virus

               15.  What is the most effective defense against cross-site scripting
                    attacks?

                    A.  Limiting account privileges

                    B.  Input validation

                    C.  User authentication

                    D.  Encryption

               16.  What worm was the first to cause major physical damage to a
                    facility?


                    A.  Stuxnet

                    B.  Code Red

                    C.  Melissa

                    D.  RTM

               17.  Ben’s system was infected by malicious code that modified the
                    operating system to allow the malicious code author to gain access
                    to his files. What type of exploit did this attacker engage in?

                    A.  Escalation of privilege

                    B.  Back door


                    C.  Rootkit

                    D.  Buffer overflow

              18.  What technology does the Java language use to minimize the threat
                    posed by applets?

                    A.  Confidentiality

                    B.  Encryption
   1499   1500   1501   1502   1503   1504   1505   1506   1507   1508   1509