1. The security manager is unauthorized tables and reports, which were not present before, on a Linux database server. The database server only communicates with a web server that connects to the database server using an account with SELECT privileges only. Web server logs shows that: 90.76.165.40 à ¬ '- [08 / Mar / 2014: 10: 54: 04] à ¬ Å?GET calendar.php create% 20table% 20hidden HTTP / 1.1A ¬ 200 5724 90.76.165.40? à ¬ '- [08 / Mar / 2014: 10: 54: 05] à ¬ Å?GET ../../../root/.bash_history HTTP / 1.1A ¬ 200 90.76.165.40 5724 à ¬' - [08 / Mar / 2014: 10: 54: 04] à ¬ Å?GET index.php? user = HTTP / 1.1A ¬ 200 5724 security manager also inspects the following file locations on the database server command à ¬ ZLS -al / rootà ¬ Ÿ drwxrwxrwx 11 root root 4096 september 28 22:45. drwxr-xr-x 25 root root March 8 4096 09:30 .. -RWs ------ 25 root root March 8 4096 09:30 .bash_history -rw ------- root root 25 March 8th 4096 09:30 .bash_history -rw ------- root root 4096 25 March 8 9:30 .profile -rw ------- root root 4096 25 March 8 9:30 .ssh Which of the following attacks was used to damage the database server and some can manage to carry out the security for such attacks in the future to detect? (Choose two)(Select 2answers)
A) Cross-site scripting B) privilege escalation C) SQL injection D) crontab update with: find Type / (-perm -4000 ) f print0 | xargs -0 ls | email.sh E) brutal attack
2. The source image workstation new accounting PCs is blue-screening began. A technician notices that the date / time stamp of the image source seems to have changed. The desktop support manager has asked the Information Security Department to determine if changes are made to the source image. Which of the following would best help with this process? (Choose two).(Select 2answers)
A) Ask desktop support have made any changes to the images. B) Dissect all the images to determine if additional data is hidden using steganography C) Check important system files to see if the date / time stamp in the past six months. D) image source system to pick back up and run traffic analysis comparison of the two images. E) Calculate a new hash and compare it with the previously captured image hash
3. A popular commercial virtualization platform allows for the creation of virtual hardware. For virtual machines, the virtual hardware is indistinguishable from real hardware. By implementing virtualized TPMs, which of the following trusted system concepts can be implemented?
A) Software-based root of trust B) None C) Continuous chain of trust D) trust anchor-based software with no root of trust E) Chain of trust with a hardware root of trust
4. A developer is to determine the best way to improve security is being developed within the code. The developer focuses on input fields where customers enter their credit card information. Which of the following techniques, if implemented in the code, would protect the most effective area to be entered against deformed?
A) Encrypting credit card data B) Client side input validation C) regular expressions D) stored procedure E) None
5. The Information Security Officer (ISO) is reviewing new policies which have recently been made effective and now apply to the company. Upon review, the ISO identifies a new requirement to implement two-factor authentication on the companyà ¬ Ys wireless system. Due to budgetary constraints, the company will be able to implement the requirement for the next two years. The ISO is required to form a policy exception to the Chief Information Officer (CIO). Which of the following are the most important to include in the submission of the exemption form? (Choose three.)(Select 3answers)
A) All parts of the policy that can not comply with the requirements warrant. B) Best practices regarding the technical implementation of the current controls. C) Risks related to the failure to implement the requirements. D) Current and planned controls to mitigate the risks. E) Business or technical justification for not implementing the rules.
Leave a comment