Podcast
Questions and Answers
What is a common threat related to mobile code execution?
What is a common threat related to mobile code execution?
- Object reuse vulnerability
- Dynamic email risks (correct)
- JavaScript security
- Garbage collection in Java
Which type of small programs written in Java are usually subject to a sandbox?
Which type of small programs written in Java are usually subject to a sandbox?
- Mobile agents
- Scripting languages
- Active X controls
- Java applets (correct)
What is an issue that Java applets are meant to address?
What is an issue that Java applets are meant to address?
- Garbage collection in Java
- Object reuse vulnerability
- JavaScript security (correct)
- Dynamic email risks
Which of the following poses a significant risk in emails?
Which of the following poses a significant risk in emails?
What type of control is suggested for emails with active scripts or links?
What type of control is suggested for emails with active scripts or links?
Which of the following is more likely to be affected by Object reuse vulnerability?
Which of the following is more likely to be affected by Object reuse vulnerability?
What is a buffer overflow?
What is a buffer overflow?
How can a buffer-overflow attack be exploited by a hacker?
How can a buffer-overflow attack be exploited by a hacker?
Which type of buffer overflow is more common among attackers?
Which type of buffer overflow is more common among attackers?
What is the main difference between stack-based and heap-based buffer overflows?
What is the main difference between stack-based and heap-based buffer overflows?
Which type of buffer overflow attack is considered difficult to execute and less common?
Which type of buffer overflow attack is considered difficult to execute and less common?
In a buffer overflow attack, what does the extra data sometimes contain that could trigger specific actions?
In a buffer overflow attack, what does the extra data sometimes contain that could trigger specific actions?
What is the purpose of garbage collection in Java?
What is the purpose of garbage collection in Java?
What is a trap door in a program?
What is a trap door in a program?
Which of the following is a risk associated with incomplete parameter check and enforcement?
Which of the following is a risk associated with incomplete parameter check and enforcement?
What is the main concern regarding object reuse vulnerability?
What is the main concern regarding object reuse vulnerability?
Which type of covert channel communicates by modifying a stored object?
Which type of covert channel communicates by modifying a stored object?
What precaution should be taken to ensure confidential information is protected from being re-assigned without being cleared?
What precaution should be taken to ensure confidential information is protected from being re-assigned without being cleared?
Flashcards are hidden until you start studying