203. Continuous monitoring is performed in which of the following phases of a system development life cycle (SDLC)?
a.
Initiationb.
Development/acquisitionc.
Implementationd.
Operations/maintenance204. Which of the following are examples of local threats in Windows Extreme Programming (XP) systems?
a.
Unauthorized local access and malicious payloadsb.
Boot process and privilege escalationc.
Network services and data disclosured.
Boot process and data disclosureRemote threats in Windows XP systems include network services, data disclosure, and malicious payloads. A network service threat results when remote attackers exploit vulnerable network services on a computer system. This includes gaining unauthorized access to services and data, and causing a denial-of-service (DoS) condition. A data disclosure threat results when a third party intercepts confidential data sent over a network. A malicious payload threat results when malicious payloads (for example, viruses, worms, Trojan horses, and active content) attack computer systems through many vectors. System end users may accidentally trigger malicious payloads.
205. Attackers can use which of the following flaws to attack back-end components through a Web application?
a.
Broken access controlb.
Invalidated inputc.
Broken authenticationd.
Cross-site scripting flaws206. What do you call it when attacks consume Web application resources to a point where other legitimate users can no longer access or use the application?
a.
Buffer overflowsb.
Injection flawsc.
Denial-of-serviced.
Improper error handling207. What do you call it when an attack can cause errors to occur, which the Web application does
a.
Buffer overflowsb.
Injection flawsc.
Denial-of-serviced.
Improper error handling208. The information systems security analyst’s participation in which of the following system development life cycle (SDLC) phases provides maximum benefit to the organization?
a.
System requirements definitionb.
System designc.
Program developmentd.
Program testing