Page 1569 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1569

Chapter 21: Malicious Code and Application

               Attacks




                1.  A. Signature detection mechanisms use known descriptions of
                    viruses to identify malicious code resident on a system.


                2.  B. The DMZ (demilitarized zone) is designed to house systems like
                    web servers that must be accessible from both the internal and
                    external networks.

                3.  B. The time of check to time of use (TOCTOU) attack relies on the
                    timing of the execution of two events.

                4.  A. While an advanced persistent threat (APT) may leverage any of
                    these attacks, they are most closely associated with zero-day
                    attacks.


                5.  A. In an attempt to avoid detection by signature-based antivirus
                    software packages, polymorphic viruses modify their own code
                    each time they infect a system.

                6.  A. LastPass is a tool that allows users to create unique, strong
                    passwords for each service they use without the burden of
                    memorizing them all.

                7.  D. Buffer overflow attacks allow an attacker to modify the contents

                    of a system’s memory by writing beyond the space allocated for a
                    variable.

                8.  D. Except option D, the choices are forms of common words that
                    might be found during a dictionary attack. mike is a name and
                    would be easily detected. elppa is simply apple spelled backward,
                    and dayorange combines two dictionary words. Crack and other
                    utilities can easily see through these “sneaky” techniques. Option D

                    is simply a random string of characters that a dictionary attack
                    would not uncover.

                9.  B. Salting passwords adds a random value to the password prior to
                    hashing, making it impractical to construct a rainbow table of all
   1564   1565   1566   1567   1568   1569   1570   1571   1572   1573   1574