187. Which of the following is an example of risk on the client side of a network?
a.
Software development toolsb.
Scriptsc.
Document formatsd.
Active-X controlsThe other three choices are risks from the server side. On the server side, any unnecessary software not needed in providing Web services should be removed as well, particularly any software development tools that could be used to further an attack if an intruder should gain an initial foothold. Ideally, server-side scripts should constrain users to a small set of well-defined functionality and validate the size and values of input parameters so that an attacker cannot overrun memory boundaries or piggyback arbitrary commands for execution. Scripts should be run only with minimal privileges (i.e., nonadministrator) to avoid compromising the entire website in case the scripts have security flaws. Potential security weaknesses can be exploited even when Web applications run with low privilege settings. For example, a subverted script could have enough privileges to mail out the system password file, examine the network information maps, or launch a login to a high numbered port.
Whenever possible, content providers and site operators should provide material encoded in less harmful document formats. For example, if document distillers are not available to convert textual documents into portable document format (PDF), an alternative is to make available a version in .rtf (rich text format), rather than a proprietary word processing format.
188. Which of the following is an issue when dealing with information cross-domains?
a.
Authentication policyb.
Level of trustc.
Common infrastructured.
Shared infrastructureAuthentication policy and the use of a common and shared infrastructure with appropriate protections at the operating system, application system, and workstation levels are some of solutions for ensuring effective cross-domain interactions.
189. Which of the following approaches isolates public-access systems from mission-critical resources?
1.
Physical isolation2.
Demilitarized zones3.
Screened subnets4.
Security policies and proceduresa.
1 and 2b.
2 and 3c.
1 and 4d.
1, 2, 3, and 4190. Enclave boundary for information assurance is defined as which of the following?
1.
The point at which information enters an organization2.
The point at which information leaves an enclave3.
The physical location is relevant to an organization4.
The logical location is relevant to an enclavea.
1 and 3b.
2 and 4c.
3 and 4d.
1, 2, 3, and 4191. Operations, one of the principal aspects of the defense-in-depth strategy does
a.
Readiness assessmentsb.
Security managementc.
Cryptographic key managementd.
Physical security