CCCURE试题.docx

上传人:b****5 文档编号:3245238 上传时间:2022-11-21 格式:DOCX 页数:96 大小:68.38KB
下载 相关 举报
CCCURE试题.docx_第1页
第1页 / 共96页
CCCURE试题.docx_第2页
第2页 / 共96页
CCCURE试题.docx_第3页
第3页 / 共96页
CCCURE试题.docx_第4页
第4页 / 共96页
CCCURE试题.docx_第5页
第5页 / 共96页
点击查看更多>>
下载资源
资源描述

CCCURE试题.docx

《CCCURE试题.docx》由会员分享,可在线阅读,更多相关《CCCURE试题.docx(96页珍藏版)》请在冰豆网上搜索。

CCCURE试题.docx

CCCURE试题

1.Question:

|Difficulty:

4/5|Relevancy:

3/3

Asharedresourcematrixisatechniquecommonlyusedtolocate:

Maliciouscode

Securityflaws

Trapdoors

o›

Covertchannels

Congratulations,yougotthecorrectanswer!

Detailscanbereviewedbelow.

Details

Submitacommentonthisquestion

Thecorrectansweris:

covertchannels

Analyzingresourcesofasystemisonestandardforlocatingcovertchannelsbecausethebasisofacovertchannelisasharedresource.

Thefollowingpropertiesmustholdforastoragechanneltoexist:

1.Bothsendingandreceivingprocessmusthaveaccesstothesameattributeofasharedobject.

2.Thesendingprocessmustbeabletomodifytheattributeofthesharedobject.

3.Thereceivingprocessmustbeabletoreferencethatattributeofthesharedobject.

4.Amechanismforinitiatingbothprocessesandproperlysequencingtheirrespectiveaccessestothesharedresourcemustexist.

Note:

 Similarpropertiesfortimingchannelcanbelisted

Thefollowinganswersareincorrect:

AllotheranswerswerenotdirectlyrelatedtodiscoveryofCovertChannels.

Thefollowingreference(s)were/wasusedtocreatethisquestion:

AuerbachPublications, AuerbachPublications(TestSeries)-CRCPressLLC,PageNo.225

and

http:

//e-articles.info/e/a/title/Covert-Channels/

 

 

Questioncontributedby:

Eit

EmailorCCCureNicknameofquestionauthor:

Eit

Questionreviewedby:

ClementDupuis

Questioncommentsubmitedby:

Studyarea:

CISAdomain#1-TheISAuditProcess

Thisquestion©Copyright2003–2009cccure.org.Allrightsreserved.Nounauthorizeduseorduplicationwithoutexplicitwrittenpermissionofauthorandofcccure.org.

2.Question:

|Difficulty:

1/5|Relevancy:

3/3

Whichofthefollowingisadetectivecontrol?

Segregationofduties

Back-upprocedures

o›

Audittrails

Physicalaccesscontrol

Youdidnotprovideanyanswertothisquestion.Pleasereviewdetailsbelow.

Details

Submitacommentonthisquestion

Audittrailscaptureinformation,whichcanbeusedfordetectingerrors.Therefore,theyareconsideredtobedetectivecontrols.Back-upproceduresarecorrectivecontrolswhereassegregationofdutiesandphysicalaccesscontrolsareexamplesofpreventivecontrols.

Source:

InformationSystemsAuditandControlAssociation,CertifiedInformationSystemsAuditor2002reviewmanual,Chapter1:

TheISAuditProcess(page30).

Contributor:

ChristianVezina

Studyarea:

CISAdomain#1-TheISAuditProcess

Coveredtopic:

Audittrails

Thisquestion©Copyright2003–2009ChristianVezina,cccure.org.Allrightsreserved.Nounauthorizeduseorduplicationwithoutexplicitwrittenpermissionofauthorandofcccure.org.

3.Question:

|Difficulty:

3/5|Relevancy:

3/3

NathaliehasshownakeeninterestinlearningmoreaboutSecuritytestingandPenetrationTesting. Shevisitedthelocallibraryinhertownandfoundtherewasafewbooksabouthackingwhichshesignedoutfortheweekend. PassingbyherpreferrednewsstandshesawacopyoftheHakin9magazineanddecidedtobuyit. ShewasverypleasedtonotethatitcomeswithabootableCDROMthatcontainsamodifiedversionofBackTrackwhichisaspecialLinuxDistributionforpenetrationtester.

Thenextdayshewentbacktothelibraryandusedhernewbootableoperatingsystemtoprobethenetworkandattempttoidentifyvulnerabiltiesthatshecouldreporttothelibrarymanagerinordertohelpthemsecuresystemsagainstmaliciousattackers.

WhatiswrongwithNathaliesactionanddoyouthinkitwasjustified?

Nathaliedidnothaveauthorizationfromtheowneroftheresourcesbutitwasjustifiedasshewantedtoprotectthenetwork.

o›

NathaliedidnothaveauthorizationfromtheowneroftheresourcesbutitwasNOTjustifiedeventhoushewantedtoprotectthenetwork.

UsageofbootableLinuxCDROMisforbiddeninmostlibrairiesbutheractionswerejustifedbyherwillingnesstohelp.

AslongasshedoesnotexploittheweaknessesthatwerefoundNathaliedidtherightthingandheractionswerejustified.

Youdidnotprovideanyanswertothisquestion.Pleasereviewdetailsbelow.

Details

Submitacommentonthisquestion

Thecorrectansweris:

NathaliedidNOThaveauthorizationfromtheowneroftheresourcesanditwasNOTjustifiedeventhoushewantedtoprotectthenetwork.

EventhouNathalie'sintentionswerenobleandshewantedtohelp,doinganytypeoftestingwithoutthepermissionsoftheowneroftheresourcemakesyouacrackerjustlikeanyotherpersonwhowouldbetryingtobreakintosystemswithoutproperauthorization. Thefactsheclaimitwasforthegoodofthenetworkdoesnotjustifydoingsuchaction.

Thefollowinganswersareincorrect:

NathaliedidNOThaveauthorizationfromtheowneroftheresourcesb

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 经管营销 > 财务管理

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1