1. Right Answer: D
Explanation: Input validation is the process of checking all input for things such as proper format and proper length.
2. Right Answer: D
Explanation: A web application firewall (WAF) applies rule sets to an HTTP conversation. These sets cover common attack types to which these session types are susceptible.
3. Right Answer: C
Explanation: In over-the-shoulder code review, coworkers review the code while the author explains his reasoning.
4. Right Answer: C
Explanation: Simple Certificate Enrollment Protocol (SCEP) is used to provision certificates to network devices, including mobile devices.
5. Right Answer: A
Explanation: The inherent limitation of ACLs is their inability to detect whether IP spoofing is occurring. IP address spoofing is a technique hackers use to hide their trail or to masquerade as other computers. A hacker alters the IP address as it appears in a packet to attempt to allow the packet to get through an ACL that is based on IP addresses.