1. Which of the following is the BEST reason to run an untested application is a sandbox?
A) To prevent the application from acquiring escalated privileges and accessing its host system
B) To allow the application to take full advantage of the host system's resources and storage
C) To increase application processing speed so the host system can perform real-time logging
D) To utilize the host systems antivirus and firewall applications instead of running it own protection
2. Which of the following is commonly done as part of a vulnerability scan?
A) Exploiting misconfigured applications
B) Cracking employee passwords
C) Identifying unpatched workstations
D) Sending phishing emails to employees
3. Which of the following occurs when the security of a web application relies on JavaScript for input validation?
A) A host-based firewall is required.
B) The security of the application relies on antivirus.
C) The integrity of the data is at risk.
D) The application is vulnerable to race conditions.
4. Which of the following should identify critical systems and components?
A) MOU
B) BPA
C) BCP
D) ITCP
5. While troubleshooting a client application connecting to the network,the security administrator notices the following error: Certificate is not valid. Which of the following is the BEST way to check if the digital certificate is valid?
A) PKI
B) CSR
C) CRL
D) IPSec