A stead reduction in memory available on the heap to the point where it is completely exhausted
is known as a __.
c. memory injection
d. memory leak
A __ is any action that compromises the security of information owned by an organization.
a. security mechanism
b. security attack
c. security policy
d. security service
__ is a function that removes specific identifying information from query results, such as last name and telephone number, but creates some sort of unique identifier so that analysts can detect connections between queries.
b. Data transformation
c. Immutable audit
d. Selective revelation
A capability set up for the purpose of assisting in responding to computer security-related incidents that involve sites within a defined constituency is called a __.
d. all of the above
The __ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.
ESP supports two modes of use: transport and _.
With _ the linking to shared library routines is deferred until load time so that if changes are made any program that references the library is unaffected.
a. statically linked shared libraries
b. dynamically linked shared libraries
c. system linked shared libraries
d. all of the above
_ is a markup language that uses sets of embedded tags or labels to characterize text elements within a document so as to indicate their appearance, function, meaning, or context.
Digital signatures and key management are the two most important applications of __ encryption.
c. preimage resistant
__ encompasses intrusion detection, prevention and response.
a. Intrusion management
b. Security assessments
c. Database access control
d. Data loss prevention
_ scan critical system files, directories, and services to ensure they have not been changed without proper authorization.
a. Intrusion prevention systems
b. System integrity verification tools
c. Log analysis tools
d. Network and host intrusion detection systems
The MPDU exchange for distributing pairwise keys is known as the _.
a. pseudorandom function
b. cryptographic function
d. 4-way handshake
__ refers to setting a maximum number with respect to roles.
A __ interconnects the IoT-enabled devices with the higher-level communication networks.
_ is a minimal set of conventions for invoking code using XML over HTTP that enables applications to request services from one another with XML-based requests and receive responses as data formatted with XML.
The buffer is located __ .
a. in the heap
b. on the stack
c. in the data section of the process
d. all the above
__ specification indicates the impact on the organization should the particular threat in question actually eventuate.
__ are resources that should be used as part of the system security planning process.
b. Online resources
c. Specific system hardening guides
d. All of the above
It is possible to specifically defend against the __ by using a modified version of the TCP connection handling code.
a. three-way handshake
b. UDP flood
c. SYN spoofing attack
d. flash crowd
The National Institute of Standards and Technology has published Federal Information Processing Standard FIPS PUB 186, known as the __.