203. Continuous monitoring is performed in which of the following phases of a system development life cycle (SDLC)?
a. Initiation
b. Development/acquisition
c. Implementation
d. Operations/maintenance
204. Which of the following are examples of local threats in Windows Extreme Programming (XP) systems?
a. Unauthorized local access and malicious payloads
b. Boot process and privilege escalation
c. Network services and data disclosure
d. Boot process and data disclosure
Remote threats in Windows XP systems include network services, data disclosure, and malicious payloads. A network service threat results when remote attackers exploit vulnerable network services on a computer system. This includes gaining unauthorized access to services and data, and causing a denial-of-service (DoS) condition. A data disclosure threat results when a third party intercepts confidential data sent over a network. A malicious payload threat results when malicious payloads (for example, viruses, worms, Trojan horses, and active content) attack computer systems through many vectors. System end users may accidentally trigger malicious payloads.
205. Attackers can use which of the following flaws to attack back-end components through a Web application?
a. Broken access control
b. Invalidated input
c. Broken authentication
d. Cross-site scripting flaws
206. What do you call it when attacks consume Web application resources to a point where other legitimate users can no longer access or use the application?
a. Buffer overflows
b. Injection flaws
c. Denial-of-service
d. Improper error handling
207. What do you call it when an attack can cause errors to occur, which the Web application does
a. Buffer overflows
b. Injection flaws
c. Denial-of-service
d. Improper error handling
208. The information systems security analyst’s participation in which of the following system development life cycle (SDLC) phases provides maximum benefit to the organization?
a. System requirements definition
b. System design
c. Program development
d. Program testing