187. Which of the following is an example of risk on the client side of a network?
a. Software development tools
b. Scripts
c. Document formats
d. Active-X controls
The other three choices are risks from the server side. On the server side, any unnecessary software not needed in providing Web services should be removed as well, particularly any software development tools that could be used to further an attack if an intruder should gain an initial foothold. Ideally, server-side scripts should constrain users to a small set of well-defined functionality and validate the size and values of input parameters so that an attacker cannot overrun memory boundaries or piggyback arbitrary commands for execution. Scripts should be run only with minimal privileges (i.e., nonadministrator) to avoid compromising the entire website in case the scripts have security flaws. Potential security weaknesses can be exploited even when Web applications run with low privilege settings. For example, a subverted script could have enough privileges to mail out the system password file, examine the network information maps, or launch a login to a high numbered port.
Whenever possible, content providers and site operators should provide material encoded in less harmful document formats. For example, if document distillers are not available to convert textual documents into portable document format (PDF), an alternative is to make available a version in .rtf (rich text format), rather than a proprietary word processing format.
188. Which of the following is an issue when dealing with information cross-domains?
a. Authentication policy
b. Level of trust
c. Common infrastructure
d. Shared infrastructure
Authentication policy and the use of a common and shared infrastructure with appropriate protections at the operating system, application system, and workstation levels are some of solutions for ensuring effective cross-domain interactions.
189. Which of the following approaches isolates public-access systems from mission-critical resources?
1. Physical isolation
2. Demilitarized zones
3. Screened subnets
4. Security policies and procedures
a. 1 and 2
b. 2 and 3
c. 1 and 4
d. 1, 2, 3, and 4
190. Enclave boundary for information assurance is defined as which of the following?
1. The point at which information enters an organization
2. The point at which information leaves an enclave
3. The physical location is relevant to an organization
4. The logical location is relevant to an enclave
a. 1 and 3
b. 2 and 4
c. 3 and 4
d. 1, 2, 3, and 4
191. Operations, one of the principal aspects of the defense-in-depth strategy does
a. Readiness assessments
b. Security management
c. Cryptographic key management
d. Physical security