What software flaw allows stack overflows and other memory-bound attacks to succeed?
a. Inadequate confinement properties. b. Compartmentalization not enforced. c. Insufficient parameter checking. d. Applications execute in privileged mode. 18. Between-the-lines, line disconnects, interrupt and NAK attacks are all examples of exploits related to a. System data channel b. System timing (TOC/TOU) c. System bounds checking d. Passive monitoring VII. Operations Security 19. Why are unique user IDs critical in the review of audit trails? a. They show which files were altered. b. They establish individual accountability. c . They cannot be easily altered. d. They trigger corrective controls. 20. An e-mail gateway that does not restrict the reception of e-mail to a known set of addresses can be used by a hacker for a. Spamming attacks b. NAK attacks c. Exhaustive attacks d. Spoofing attacks 21. Which of the following is an example of an operations security attack that is designed to cause the system, or a portion of the system, to cease operations? a. Ping of Death b. Brute f