- (Exam Topic 11)
Which of the following is the MOST important output from a mobile application threat modeling exercise according to Open Web Application Security Project (OWASP)?
Correct Answer:
D
- (Exam Topic 15)
Which of the following is the BEST way to determine the success of a patch management process?
Correct Answer:
A
- (Exam Topic 14)
Which of the following techniques BEST prevents buffer overflows?
Correct Answer:
B
Some products installed on systems can also watch for input values that might result in buffer overflows, but the best countermeasure is proper programming. This means use bounds checking. If an input value is only sup-posed to be nine characters, then the application should only accept nine characters and no more. Some languages are more susceptible to buffer overflows than others, so programmers should understand these issues, use the right languages for the right purposes, and carry out code review to identify buffer overflow vulnerabilities.
- (Exam Topic 10)
Which of the following assures that rules are followed in an identity management architecture?
Correct Answer:
D
- (Exam Topic 15)
A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?
Correct Answer:
A