Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
problem1 what commands are used to manipulate extended file attributes access lists in unix and linux systems2 what
problem1 why is it important to rotate log files2 how is a chroot jail used to improve application security3 where are
problem1 where is application and service configuration information stored on windows systems2 what is virtualization3
problem1 state some threats that result from a process running with administrator or root privileges on a system2 set
problem1 why are file system permissions so important in the linux dac model how do they relate or map to the concept
problemsuppose you operate an apache-based linux web server that hosts your companys e-commerce site suppose further
problem1 why is logging important what are its limitations as a security control what are pros and cons of remote
problemwhat are the advantages and disadvantages of using a file integrity checking tool eg tripwire this is a program
problemsome have argued that unixlinux systems reuse a small number of security features in many contexts across the
problem1 explain the differences among the terms security class security level security clearance and security
problem1 what is the principal difference between the blp model and the biba model2 what are the three rules specified
problem1 in general terms how can mls be implemented in an rbac system2 describe each of the possible degrees of
problemreview some of the recent vulnerability announcements from cert sans or similar organizations identify a number
problem1 investigate the details of the format string overflow attack how it works and how the attack string it uses is
problem1 define the difference between software quality and reliability and software security2 define defensive
problem1 define an injection attack list some examples of injection attacks what are the general circumstances in which
problem1 list several software security concerns associated writing safe program code2 define race condition state how
problemexamine the current values of all environment variables on a system you use if possible determine the use for
problemrfc 791 the ipv4 protocol specification describes a reassembly algorithm that results in new fragments
problema common management requirement is that all external web traffic must flow via the organizations web proxy
probemconsider the threat of theftbreach of proprietary or confidential information held in key data files on the
problem1 define buffer overflow2 list the three distinct types of locations in a process address space that buffer
assignmentyou are given the following informal firewall policy details to be implemented using a firewall like that in
problemexplain the strengths and weaknesses of each of the following firewall deployment scenarios in defending servers
problem1 describe what a nop sled is and how it is used in a buffer overflow attack2 list some of the different