The concepts of layered protections, system partitioning, and line-of-defenses form a core part of security-in-depth or defense-in-depth strategy. By using multiple, overlapping protection mechanisms, the failure or circumvention of any individual protection approach will not leave the system unprotected. Through user training and awareness, well-crafted policies and procedures, and redundancy of protection mechanisms, layered protections enable effective protection of IT assets for the purpose of achieving its objectives. System partitioning means system components reside in separate physical domains. Managed interfaces restrict network access and information flow among partitioned system components. The line-of-defenses are security mechanisms for limiting and controlling access to and use of computer system resources. They exercise a directing or restraining influence over the behavior of individuals and the content of computer systems.
97. Most spyware detection and removal utility software specifically looks for which of the following?
a. Encrypted cookies
b. Session cookies
c. Persistent cookies
d. Tracking cookies
Encrypted cookies are incorrect because they protect the data from unauthorized access. Session cookies are incorrect because they are temporary cookies that are valid only for a single website session. Persistent cookies are incorrect because they are stored on a computer indefinitely so that a website can identify the user during subsequent visits.
98. A system is in a failure state when it is
1. Protection-state
2. Reachable-state
3. System-state
4. Initial-state
a. 1 or 2
b. 1 and 3
c. 3 and 4
d. 1, 2, 3, and 4
99. A buffer overflow attack is an example of which of the following threat category that applies to systems on the Internet?
a. Browser-oriented
b. User-oriented
c. Server-oriented
d. Network-oriented
The other three choices are incorrect because they do not involve buffer overflow attacks. Web browser-oriented threats can launch attacks against Web browser components and technologies. Web-based applications often use tricks, such as hidden fields within a form, to provide continuity between transactions, which may provide an avenue of attack. Examples of user-oriented threats include social engineering. Examples of network-oriented threats include spoofing, masquerading, and eavesdropping attacks.
100. In general, which of the following is legal under reverse-engineering practices?