A buffer overflow can best be described as
A) A hacker who makes a website that has more content than the browser can handle
B) A hacker who sends more data than is expected in an attempt to overwrite legitimate memory
C) A hacker who uses an e-mail virus to format the hard drive with junk code
D) A hacker who sends repeated requests for information from a server in an attempt to crash the server
Correct Answer:
Verified
Q1: The Terms RC4 and 3DES refer to
A)Protocols
Q2: Which are the most common exploit used
Q4: The Open Vulnerability and Assessment Language (OVAL)_.
A)Is
Q5: The SFTP protocol incorporates what into FTP?
A)SSL
B)Secure
Q6: Which of the following in a browser
Q7: One way a user can feel confident
Q8: SSMTP uses TCP port
A)25
B)110
C)465
D)456
Q9: Common Gateway Interface (CGI)security issues include
A)Poorly configured
Q10: Running Java applets from the Web on
Q11: TCP Ports 989 and 990 are associated
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents