Question
QUESTION 44 Which of the following is a common problem, yet commonly overlooked, in regards to physical security in server rooms? Firewalls that do not
QUESTION 44
Which of the following is a common problem, yet commonly overlooked, in regards to physical security in server rooms?
- Firewalls that do not have a dedicated backup
- False ceilings
- Logic bombs
- Biometric malfunctions
____________________________________________________________________________________________
QUESTION 45
Which tool is best suited for identifying applications and code on a Web server that can lead to a SQL injection attack?
- A vulnerability scanner
- A packet sniffer
- An intrusion-detection system
- A network switch
__________________________________________________________________________________
QUESTION 48
You have determined that an attack is currently underway on your database server. An attacker is currently logged in, modifying data. You want to preserve logs, caching and other data on this affected server. Which of the following actions will best allow you to stop the attack and still preserve data?
- Pull the server network cable
- Shut down the server
- Back up the system logs
- Force an instant password reset
___________________________________________________________________________________
QUESTION 49
Which of the following applications can help determine whether a denial-of-service attack is occurring against a network host?
- The netstat command and a packet sniffer
- The ps command and a network scanner
- The ping command and User Manager
- The iptables command and Windows desktop firewall
_______________________________________________________________________________________________________________
QUESTION 50
You have just deployed an application that uses hash-based checksums to monitor changes in the configuration scripts of a database server that is accessible via the Internet. Which of the following is a primary concern for this solution?
- The extra hard disk space required to store the database of checksums
- The amount of memory remaining now that the checksum-based application is running
- The possibility of a buffer overflow attack leading to a security breach
- The security of the checksum database on a read-only media format
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started