1D0-671試験無料問題集「CIW Web Security Associate 認定」

Which step in security policy implementation ensures that security policy will change as technology advances?

Which of the following is the most likely first step to enable a server to recover from a denial-of- service attack in which all hard disk data is lost?

What distinguishes hash encryption from other forms of encryption?

Which of the following is a security principle that allows you to protect your network resources?

Which of the following is a common problem with proxy servers?

What is the primary strength of symmetric-key encryption?

Which task should you perform first when considering where to place equipment?

When Tripwire discovers that a file or database has been altered, how will it alert you?

Which of the following details should be included in documentation of an attack?

A disgruntled employee has discovered that the company Web server is not protected against particular buffer overflow vulnerability.
The disgruntled employee has created an application to take advantage of this vulnerability and secretly obtain sensitive data from the Web server's hard disk. This application sends a set of packets to the Web server that causes it to present an unauthenticated terminal with root privileges.
What is the name for this particular type of attack?