- (Topic 8)
What is the best means of prevention against viruses?
Correct Answer:
D
Although virus scanners only can find already known viruses this is still the best defense, together with users that are informed about risks with the internet.
- (Topic 6)
Which of the following is an automated vulnerability assessment tool?
Correct Answer:
C
Nessus is a vulnerability assessment tool.
- (Topic 8)
Which of the following buffer overflow exploits are related to Microsoft IIS web server? (Choose three)
Correct Answer:
ABC
Both the buffer overflow in the Internet Printing Protocol and the ISAPI
extension buffer overflow is explained in Microsoft Security Bulletin MS01-023. The Code Red worm was a computer worm released on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server.
- (Topic 7)
John wishes to install a new application onto his Windows 2000 server. He wants to ensure that any application he uses has not been Trojaned. What can he do to help ensure this?
Correct Answer:
A
MD5 was developed by Professor Ronald L. Rivest of MIT. What it does, to quote the executive summary of rfc1321, is:
[The MD5 algorithm] takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or
to produce any message having a given prespecified target message digest. The MD5 algorithm is intended for digital signature applications, where a large file must be "compressed" in a secure manner before being encrypted with a private (secret) key under a public-key cryptosystem such as RSA.
In essence, MD5 is a way to verify data integrity, and is much more reliable than checksum and many other commonly used methods.
- (Topic 3)
Which of the following represent weak password? (Select 2 answers)
Correct Answer:
EH