没有合适的资源?快使用搜索试试~ 我知道了~
SCOR 350-701-V7.pdf
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
5星 · 超过95%的资源 1 下载量 113 浏览量
2022-07-10
14:01:19
上传
评论
收藏 2.61MB PDF 举报
温馨提示
试读
156页
SCOR 350-701-V7.pdf
资源推荐
资源详情
资源评论
SCOR 350-701 V7
Number: 350-701
Passing Score: 800
Time Limit: 120 min
File Version: 7.0
Updated june 23rd with 48 new questions from Securitytut
Exam A
QUESTION 1
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
A. Smurf
B. distributed denial of service
C. cross-site scripting
D. rootkit exploit
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation
Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user.
The data is usually gathered in the form of a hyperlink which contains malicious content within it. The user will
most likely click on this link from another website, instant message, or simply just reading a web board or email
message.
Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods)
so the request is less suspicious looking to the user when clicked on.
For example the code below is written in hex:
<a
href=javascript:alert&#
x28'XSS')>Click Here</a>
is equivalent to:
<a href=javascript:alert('XSS')>Click Here</a>
Note: In the format “&#xhhhh“, hhhh is the code point in hexadecimal form.
QUESTION 2
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A. user input validation in a web page or web application
B. Linux and Windows operating systems
C. database
D.
web page images
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation
SQL injection usually occurs when you ask a user for input, like their username/userid, but the user gives
(“injects”) you an SQL statement that you will unknowingly run on your database. For example:
Look at the following example, which creates a SELECT statement by adding a variable (txtUserId) to a select
string. The variable is fetched from user input (getRequestString):
txtUserId = getRequestString(“UserId”);
txtSQL = “SELECT * FROM Users WHERE UserId = ” + txtUserId;
If user enter something like this: “100 OR 1=1” then the SQL statement will look like this:
SELECT * FROM Users WHERE UserId = 100 OR 1=1;
The SQL above is valid and will return ALL rows from the “Users” table, since OR 1=1 is always TRUE. A
hacker might get access to all the user names and passwords in this database.
QUESTION 3
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)
A. Check integer, float, or Boolean string parameters to ensure accurate values.
B. Use prepared statements and parameterized queries.
C. Secure the connection between the web and the app tier.
D. Write SQL code instead of using object-relational mapping libraries.
E. Block SQL code execution in the web application database login.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social
engineering attacks? (Choose two)
A. Patch for cross-site scripting.
B. Perform backups to the private cloud.
C. Protect against input validation and character escapes in the endpoint.
D. Install a spam and virus email filter.
E. Protect systems with an up-to-date antimalware program.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
Explanation
Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable
source. It is usually done through email. The goal is to steal sensitive data like credit card and login information,
or to install malware on the victim’s machine.
QUESTION 5
Which two mechanisms are used to control phishing attacks? (Choose two)
A. Enable browser alerts for fraudulent websites.
B. Define security group memberships.
C. Revoke expired CRL of the websites.
D. Use antispyware software.
E. Implement email filtering techniques.
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
Which two behavioral patterns characterize a ping of death attack? (Choose two)
A. The attack is fragmented into groups of 16 octets before transmission.
B. The attack is fragmented into groups of 8 octets before transmission.
C. Short synchronized bursts of traffic are used to disrupt TCP connections.
D. Malformed packets are used to crash systems.
E. Publicly accessible DNS servers are typically used to execute the attack.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation
Ping of Death (PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash,
destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a
simple ping command.
A correctly-formed ping packet is typically 56 bytes in size, or 64 bytes when the ICMP header is considered,
and 84 including Internet Protocol version 4 header. However, any IPv4 packet (including pings) may be as
large as 65,535 bytes. Some computer systems were never designed to properly handle a ping packet larger
than the maximum packet size because it violates the Internet Protocol documented
Like other large but well-formed packets, a ping of death is fragmented into groups of 8 octets before
transmission. However, when the target computer reassembles the malformed packet, a buffer overflow can
occur, causing a system crash and potentially allowing the injection of malicious code.
QUESTION 7
Which two preventive measures are used to control cross-site scripting? (Choose two)
A. Enable client-side scripts on a per-domain basis.
B. Incorporate contextual output encoding/escaping.
C. Disable cookie inspection in the HTML inspection engine.
D. Run untrusted HTML input through an HTML sanitization engine.
E. Same Site cookie attribute should not be used.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
What is the difference between deceptive phishing and spear phishing?
A. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
B. A spear phishing campaign is aimed at a specific person versus a group of people.
C. Spear phishing is when the attack is aimed at the C-level executives of an organization.
D. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false
webpage.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation
In deceptive phishing, fraudsters impersonate a legitimate company in an attempt to steal people’s personal
data or login credentials. Those emails frequently use threats and a sense of urgency to scare users into doing
what the attackers want.
Spear phishing is carefully designed to get a single recipient to respond. Criminals select an individual target
within an organization, using social media and other public information – and craft a fake email tailored for that
person.
QUESTION 9
Which attack is commonly associated with C and C++ programming languages?
A. cross-site scripting
B.
water holing
C. DDoS
D. buffer overflow
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation
A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the
memory buffer. As a result, the program attempting to write the data to the buffer overwrites adjacent memory
locations.
Buffer overflow is a vulnerability in low level codes of C and C++. An attacker can cause the program to crash,
make data corrupt, steal some private information or run his/her own code. It basically means to access any
buffer outside of it’s alloted memory space. This happens quite frequently in the case of arrays.
QUESTION 10
What is a language format designed to exchange threat intelligence that can be transported over the TAXII
protocol?
A. STIX
B. XMPP
C. pxGrid
D. SMTP
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation
TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport
剩余155页未读,继续阅读
资源评论
- wozuimang2022-09-07这个资源对我启发很大,受益匪浅,学到了很多,谢谢分享~
优质网络系统领域创作者
- 粉丝: 2980
- 资源: 2417
下载权益
C知道特权
VIP文章
课程特权
开通VIP
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- stm32f103c8t6标准库模版
- CISCO 思科 固件 ASR1002-X asr1002x-universalk9.17.09.03a.SPA.bin
- redis升级和部署6.2.6最新稳定版文档和程序
- 实际的glove-car-bt里的terminal2car-send.service
- mysql-8.0.37 docker离线镜像安装包
- vue开发基于ssm-vue的段子发布平台
- 实际的glove-car-bt里的terminal2car-receive.service
- 常用的lambda表达式使用.doc
- twrp.img 第三方Recovery
- qASSAQSDDWQEDQWEDQW
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功