You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts. Which of the following is the most effective way to respond to this attack?
Which of the following is a primary auditing activity?
Which of the following is the most likely first step to enable a server to recover from a denial-of-service attack in which all hard disk data is lost?
Irina has contracted with a company to provide Web design consulting services. The company has asked her to use several large files available via an HTTP server. The IT department has provided Irina with user name and password, as well as the DNS name of the HTTP server. She then used this information to obtain the files she needs to complete her task using Mozilla Firefox. Which of the following is a primary risk factor when authenticating with a standard HTTP server?
Which of the following can help you authoritatively trace a network flooding attack?
What is the primary use of hash (one-way) encryption in networking?
Which of the following is most likely to address a problem with an operating system's ability to withstand an attack that attempts to exploit a buffer overflow?
Which of the following errors most commonly occurs when responding to a security breach?
What is the first tool needed to create a secure networking environment?
Which choice lists typical firewall functions?