1D0-671試験無料問題集「CIW Web Security Associate 認定」
A CGI application on the company's Web server has a bug written into it. This particular bug allows the application to write data into an area of memory that has not been properly allocated to the application. An attacker has created an application that takes advantage of this bug to obtain credit card information.
Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?
Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?
正解:D
解答を投票する
Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server.
When fulfilling this request, which of the following resources should you audit the most aggressively?
When fulfilling this request, which of the following resources should you audit the most aggressively?
正解:A
解答を投票する