mirror of
https://github.com/appinfosapienza/so-un-bot.git
synced 2025-03-13 18:05:22 +01:00
3266 lines
96 KiB
Text
3266 lines
96 KiB
Text
473) Developed by IBM and refined by Symantec, the __________ provides a malware detection system that will automatically capture, analyze, add detection and shielding, or remove new malware and pass information about it to client systems so the malware can be detected before it is allowed to run elsewhere
|
|
> Intrusion Prevention System (IPS)
|
|
> Firewall
|
|
> Encryption tool
|
|
v digital immune system
|
|
> Rootkit
|
|
|
|
342) In a a __________ attack the slave zombies construct packets requiring a response that contains the target's IP address as the source IP address in the packet's IP header. These packets are sent to uninfected machines that respond with packets directed at the target machine
|
|
Select one:
|
|
v reflector DDoS
|
|
> blended
|
|
> internal resource
|
|
> direct DDoS
|
|
|
|
302) ____________detection involves the collection of data relating to the behavior of legitimate users over a period of time. Statistical tests are applied to observed behavior to determine with a high level of confidence whether that behavior is not legitimate user behavior
|
|
> Signature-based
|
|
v Statistical anomaly
|
|
> Heuristic
|
|
> Machine learning
|
|
|
|
469) A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user's knowledge or consent
|
|
> Phishing attack
|
|
v drive-by-download
|
|
> Cross-site scripting (XSS)
|
|
> Denial of Service (DoS) attack
|
|
> Social engineering attack
|
|
|
|
311) The ________ is an audit collection module operating as a background process on a monitored system whose purpose is to collect data on security related events on the host and transmit these to the central manager
|
|
Select one:
|
|
> central manager module
|
|
v host agent module
|
|
> intruder alert module
|
|
> LAN monitor agent module
|
|
|
|
826) A(n) __________ is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that correct action can be taken
|
|
Select one:
|
|
> protocol
|
|
> attavk
|
|
v countermeasure
|
|
> adversary
|
|
|
|
441) _________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred, but due to a coding error, allows just one more byte to be copied than there is space available
|
|
> SQL injection
|
|
v off-by-one
|
|
> Cross-site scripting (XSS)
|
|
> Integer overflow
|
|
|
|
1145) the __________ approach is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.
|
|
> timestamp
|
|
> backward reply
|
|
v challenge-response
|
|
> replay
|
|
|
|
416) A buffer _________ is a condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information
|
|
> underflow/underrun/underwrite
|
|
v overflow/overrun/overwrite
|
|
> bypass/overwrite/override
|
|
> breach/infiltration/compromise
|
|
|
|
417) A consequence of a buffer overflow error is __________
|
|
> loss of data connectivity and communication
|
|
v corruption of data used by the program, unexpected transfer of control int he program, and possible memory access violation
|
|
> system shutdown and restart
|
|
> network congestion and slow performance
|
|
|
|
286) The _________ is the predefined formally documented statement that defines what activities are allowed to take place on an organization's network or on particular hosts to support the organization's requirements
|
|
> incident response plan
|
|
> access control list
|
|
v security policy
|
|
> encryption protocol
|
|
|
|
88) Because of the opportunities for parallel execution in __________ mode, processors that support parallel features, such as aggressive pipelining, multiple instruction dispatch per clock cycle, a large number of registers, and SIMD instructions can be effectively utilized
|
|
> CBC
|
|
v CTR
|
|
> CFB
|
|
> ECB
|
|
|
|
439) __________ is one of the best known protection mechanisms that is a GCC compiler extension that inserts additional function entry and exit code
|
|
> Address Space Layout Randomization (ASLR)
|
|
> Data Execution Prevention (DEP)
|
|
> Control Flow Integrity (CFI)
|
|
v stackguard
|
|
> Stack smashing protection
|
|
|
|
474) __________ technology is an anti-virus approach that enables the anti-virus program to easily detect even the most complex polymorphic viruses and other malware, while maintaining fast scanning speeds
|
|
> Encryption key
|
|
v Generic decryption
|
|
> Firewall
|
|
> Intrusion Detection System (IDS)
|
|
|
|
344) Unlike heuristics or fingerprint based scanners,the _________ integrates with the operating system of a host computer and monitors program behavior in real time for malicious actions
|
|
Select one:
|
|
> mobile code
|
|
> digital immune system
|
|
> generic decryption
|
|
v behavior blocking software
|
|
|
|
5) The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner
|
|
v True
|
|
> False
|
|
|
|
422) __________ can prevent buffer overflow attacks, typically of global data, which
|
|
attempt to overwrite adjacent regions in the processes address space, such as the global offset table
|
|
> secure coding practices
|
|
v guard pages
|
|
> encrypted tunnels
|
|
> intrusion detection systems (IDS)
|
|
|
|
129) Assuming that Alice and Bob have each other?s public key. In order to establish a shared session key, Alice just needs to generate a random k, encrypt k using Bob?s public key, and send the encrypted k to Bob and then Bob will know he has a key shared with Alice
|
|
> True
|
|
v False
|
|
|
|
314) A ________ is used to measure the current value of some entity. Examples include the number of logical connections assigned to a user application and the number of outgoing messages queued for a user process
|
|
Select one:
|
|
v Gauge
|
|
> Resource utilization
|
|
> Counter
|
|
> Interval timer
|
|
|
|
414) Traditionally the function of __________ was to transfer control to a user commandline interpreter, which gave access to any program available on the system with the privileges of the attacked program
|
|
> Firewall
|
|
v Shellcode
|
|
> Antivirus software
|
|
> Virtual private network (VPN)
|
|
|
|
284) The _________ (RFC 4766) document defines requirements for the Intrusion Detection Message Exchange Format (IDMEF)
|
|
v Intrusion Detection Message Exchange Requirements
|
|
> Network Security Protocol Standards
|
|
> Firewall Configuration Best Practices
|
|
> Data Encryption Algorithms
|
|
|
|
430) A __________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer and consequently overwrites adjacent memory locations
|
|
v buffer overflow
|
|
> Null pointer dereference
|
|
> Division by zero
|
|
> Integer overflow
|
|
|
|
110) An encryption scheme is _________ if the cost of breaking the cipher exceeds the value of the encrypted information and/or the time required to break the cipher exceeds the useful lifetime of the information
|
|
> vulnerable
|
|
v computationally secure
|
|
> unbreakable
|
|
> reversible
|
|
|
|
277) __________ is a security service that monitors and analyzes system events for the purpose of finding, and providing real-time warning of attempts to access system resources in an unauthorized manner
|
|
> Anti-virus software
|
|
> Data encryption
|
|
v Intrusion Detection
|
|
> Firewall
|
|
|
|
404) The function of ________ was to transfer control to a user commandline interpreter,which gave access to any program available on the system with the privileges of the attacked program
|
|
> Cryptographic hash function
|
|
v Shellcode
|
|
> Key exchange algorithm
|
|
> Digital signature
|
|
|
|
444) In the classic __________ overflow, the attacker overwrites a buffer located in the local variable area of a stack frame and then overwrites the saved frame pointer and return address
|
|
> Heap buffer overflow
|
|
> Integer overflow
|
|
> Format string vulnerability
|
|
v stack buffer
|
|
|
|
113) "The input to the encryption algorithm is the XOR of the next 64 bits of plaintext and the preceding 64 bits of ciphertext" is a description of the ________ mode of operation
|
|
> Stream Cipher (SC)
|
|
> Counter (CTR)
|
|
v Cipher Block Chaining (CBC)
|
|
> Electronic Codebook (ECB)
|
|
|
|
512) Modifying the system's TCP/IP network code to selectively drop an entry for an incomplete connection from the TCP connections table when it overflows, allowing a new connection attempt to proceed is _______
|
|
> poison packet
|
|
> slashdot
|
|
> backscatter traffic
|
|
v random drop
|
|
|
|
1120) the __________ mechanism assures that a received packet was in fact transmitted by the party identified as the source in the packet header and assures that the
|
|
Packet has not been altered in transit.
|
|
> confidentiality
|
|
v authentication
|
|
> security
|
|
> key management
|
|
|
|
81) The output of the encryption function is fed back to the shift register in Output Feedback mode, whereas in ___________ the ciphertext unit is fed back to the shift register
|
|
> Electronic Codebook mode
|
|
> Cipher Block Chaining mode
|
|
> Counter mode
|
|
v Cipher Feedback mode
|
|
|
|
111) The _________ was issued as a federal information-processing standard and is intended to replace DES and 3DES with an algorithm that is more secure and efficient
|
|
> Data Encryption Standard (DES)
|
|
> Rivest Cipher 4 (RC4)
|
|
> Blowfish
|
|
v Advanced Encryption Standard (AES)
|
|
|
|
1170) The __________ strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords.
|
|
> reactive password checking
|
|
> computer-generated password
|
|
> proactive password checking
|
|
v user education
|
|
|
|
709) The __________ strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords
|
|
> reactive password checking
|
|
> proactive password checking
|
|
> computer-generated password
|
|
v user education
|
|
|
|
305) The simplest statistical test is to measure the _________ of a parameter over some historical period which would give a reflection of the average behavior and its variability
|
|
Select one:
|
|
v mean and standard deviation
|
|
> Markoprocess
|
|
> multivariate
|
|
> time series
|
|
|
|
281) ________ detection techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious
|
|
v Signature
|
|
> Statistical
|
|
> Heuristic
|
|
> Machine learning
|
|
|
|
429) Traditionally the function of __________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program
|
|
> Ransomware
|
|
> Spyware
|
|
v shellcode
|
|
> Rootkit
|
|
> Keylogger
|
|
|
|
90) Both __________ produce output that is independent of both the plaintext and the ciphertext. This makes them natural candidates for stream ciphers that encrypt plaintext by XOR one full block at a time
|
|
> CBC and ECB
|
|
v OFB and CTR
|
|
> ECB and OFB
|
|
> CTR and CBC
|
|
|
|
322) The _________ prevents duplicate passwords from being visible in the password file. Even if two users choose the same password, those passwords will be assigned at different times
|
|
Select one:
|
|
> honeypot
|
|
v salt
|
|
> rule based intrusion detection
|
|
> audit record
|
|
|
|
407) __________ can prevent buffer overflow attacks, typically of global data, which attempt to overwrite adjacent regions in the processes address space, such as the global offset table
|
|
> Intrusion Prevention System (IPS)
|
|
> Honeytokens
|
|
v Guard pages
|
|
> Captcha
|
|
|
|
54) A __________ uses macro or scripting code, typically embedded in a document and triggered when the document is viewed or edited, to run and replicate itself into other such documents
|
|
> boot sector infector
|
|
> file infector
|
|
v macro virus
|
|
> multipartite virus
|
|
|
|
509) In both direct flooding attacks and ______ the use of spoofed source addresses results in response packets being scattered across the Internet and thus detectable
|
|
v SYN spoofing attacks
|
|
> indirect flooding attacks
|
|
> ICMP attacks
|
|
> system address spoofing
|
|
|
|
316) A _________ is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges
|
|
Select one:
|
|
v Misfeasor
|
|
> Emissary
|
|
> Clandestine User
|
|
> Masquerader
|
|
|
|
582) The __________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability
|
|
v hybrid
|
|
> community
|
|
> private
|
|
> public
|
|
|
|
262) A ________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity
|
|
> host-based IDS
|
|
> security intrusion
|
|
v network-based IDS
|
|
> intrusion detection
|
|
|
|
461) A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack
|
|
> Man-in-the-middle attack
|
|
> Social engineering attack
|
|
v blended attack
|
|
> Phishing attack
|
|
> Denial of Service (DoS) attack
|
|
|
|
823) __________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed
|
|
Select one:
|
|
v Privacy
|
|
> System Integrity
|
|
> Avvailability
|
|
> Data Integrity
|
|
|
|
279) Copying a database containing credit card numbers, viewing sensitive data without authorization, and guessing and cracking passwords are examples of _________
|
|
> firewall configuration
|
|
v intrusion
|
|
> network segmentation
|
|
> vulnerability scanning
|
|
|
|
383) The function of ___________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program
|
|
> stacking
|
|
v shellcode
|
|
> no-execute
|
|
> memory management
|
|
|
|
60) __________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions
|
|
> Fingerprint-based scanners
|
|
v Behavior-blocking software
|
|
> Generic decryption technology
|
|
> Heuristic scanners
|
|
|
|
243) A _____ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity
|
|
> Host-based IDS
|
|
> Intrusion Prevention System
|
|
> Firewal
|
|
v Network-based IDS
|
|
|
|
273) The _______ is the ID component that analyzes the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator
|
|
> data source
|
|
> sensor
|
|
> operator
|
|
v analyzer
|
|
|
|
834) ________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system
|
|
Select one:
|
|
> Data Integrity
|
|
> Confidentiality
|
|
> Availability
|
|
v System Integrity
|
|
|
|
1140) ________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.
|
|
> Identification
|
|
v Message authentication
|
|
> Verification
|
|
> User authentication
|
|
|
|
502) The ______ attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connections
|
|
> DNS amplification attack
|
|
v SYN spoofing attack
|
|
> basic flooding attack
|
|
> poison packet attack
|
|
|
|
16) __________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance
|
|
> Audit control
|
|
> Resource control
|
|
> System control
|
|
v Access control
|
|
|
|
1140) A (n)__________ uses a microcontroller, is not programmable once the program logic for the device has been burned into ROM, and has no interaction with a user.
|
|
v deeply embedded system
|
|
> constrained device
|
|
> lattice device
|
|
> embedded system
|
|
|
|
460) A _________ is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence of its presence
|
|
> Encryption tool
|
|
> Spyware
|
|
v rootkit
|
|
> Firewall
|
|
> Antivirus software
|
|
|
|
368) A buffer ____________ is a condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information
|
|
> overwrite
|
|
> overflow
|
|
> overrun
|
|
v all of these options
|
|
|
|
434) An essential component of many buffer overflow attacks is the transfer of execution to code supplied by the attacker and often saved in the buffer being overflowed.
|
|
This code is known as _________
|
|
> Exploit
|
|
v shellcode
|
|
> Payload
|
|
> Malware
|
|
|
|
326) _________ detection focuses on characterizing the past behavior of individual users or related groups of users and then detecting significant deviations
|
|
Select one:
|
|
> Threshold
|
|
v Profile-based anomaly
|
|
> Statistical anomaly
|
|
> Action condition
|
|
|
|
89) __________ mode is suitable for parallel operation. Because there is no chaining, multiple blocks can be encrypted or decrypted simultaneously. Unlike CTR mode, this mode includes a nonce as well as a counter
|
|
v XTS-AES
|
|
> S-AES
|
|
> 3DES
|
|
> OFB
|
|
|
|
264) __________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder
|
|
> Profile based detection
|
|
v Signature detection
|
|
> Threshold detection
|
|
> Anomaly detection
|
|
|
|
241) The _____ is the IDS component that analyzes the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator
|
|
> Agent
|
|
> Collector
|
|
v Analyzer
|
|
> Logger
|
|
|
|
345) _________ is a mass mailing e-mail worm that installs a backdoor in infected computers thereby enabling hackers to gain remote access to data such as passwords and credit card numbers
|
|
Select one:
|
|
> Sobig.f
|
|
v Mydoom
|
|
> Slammer
|
|
> Code Red
|
|
|
|
339) _____technology enables the antivirus program to easily detect even the most complex polymorphic viruses while maintaining fast scanning speeds
|
|
> File signature matching
|
|
v Generic Decryption
|
|
> Behavioral analysis
|
|
> Heuristic scanning
|
|
|
|
347) _________ antivirus programs are memory resident programs that identify a virus by its actions rather than its structure in an infected program
|
|
Select one:
|
|
> First generation
|
|
> Fourth generation
|
|
> Second generation
|
|
v Third generation
|
|
|
|
419) The function of ________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program
|
|
> ransomware
|
|
v shellcode
|
|
> rootkit
|
|
> keylogger
|
|
|
|
472) Countermeasures for malware are generally known as _________ mechanisms because they were first developed to specifically target virus infections
|
|
> Firewall
|
|
> Encryption tool
|
|
> Rootkit
|
|
v anti-virus
|
|
> Intrusion Detection System (IDS)
|
|
|
|
433) "Smashing the Stack for Fun and Profit" was a step by step introduction to exploiting stack-based buffer overflow vulnerabilities that was published in Phrack magazine by _________
|
|
v Aleph One
|
|
> L0phtcrack
|
|
> Acid Burn
|
|
> The Mentor
|
|
|
|
825) A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy is a(n) __________
|
|
Select one:
|
|
v vulnerability
|
|
> countermeasure
|
|
> risk
|
|
> adversary
|
|
|
|
331) The _________ worm exploits a security hole in the Microsoft Internet Information Server to penetrate and spread to other hosts. It also disables the system file checker in Windows
|
|
Select one:
|
|
> Mydoom
|
|
> Warezov
|
|
> Slammer
|
|
v Code Red
|
|
|
|
432) A ___________ overflow occurs when the targeted buffer is located on the stack, usually as a local variable in a function's stack frame
|
|
> Heap buffer overflow
|
|
> Global buffer overflow
|
|
v stack buffer
|
|
> Data section buffer overflow
|
|
|
|
84) The __________ method is ideal for a short amount of data and is the appropriate mode to use if you want to transmit a DES or AES key securely
|
|
> cipher feedback mode
|
|
> counter mode
|
|
v electronic codebook mode
|
|
> output feedback mode
|
|
|
|
303) A ________ is an individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection
|
|
Select one:
|
|
v Clandestine User
|
|
> Mole
|
|
> Masquerader
|
|
> Misfeasor
|
|
|
|
300) What are possible locations for NIDS sensors?
|
|
> inside the external firewall
|
|
> between the external firewall and the Internet
|
|
> before internal servers and database resources
|
|
> before the workstation networks
|
|
v All of the above
|
|
|
|
580) An end user who operates on database objects via a particular application but does not own any of the database objects is the __________
|
|
> application owner
|
|
v end user other than application owner
|
|
> foreign key
|
|
> administrator
|
|
|
|
710) A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords
|
|
> user education
|
|
> proactive password checking
|
|
v reactive password checking
|
|
> computer-generated password
|
|
|
|
154) ________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key
|
|
> Private key
|
|
> Key exchange protocol
|
|
v Key distribution technique
|
|
> Public key
|
|
|
|
260) A _________ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so
|
|
> intrusion detection
|
|
> IDS
|
|
> criminal enterprise
|
|
v security intrusion
|
|
|
|
824) An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) __________
|
|
> risk
|
|
> vulnerability
|
|
> asset
|
|
v attack
|
|
|
|
1297)________ includes data processing and storage equipment,transmission and networking facilities,and offline storage media.
|
|
> Supporting facilities
|
|
> Physical facilities
|
|
v Information system hardware
|
|
> Infrastructure facilities
|
|
|
|
500) A ______ triggers a bug in the system's network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded
|
|
> echo
|
|
> reflection
|
|
v poison packet
|
|
> flash flood
|
|
|
|
86) "Each block of plaintext is XORed with an encrypted counter. The counter is incremented for each subsequent block", is a description of ___________ mode
|
|
> Cipher Block Chaining
|
|
v Counter
|
|
> Cipher Feedback
|
|
> Electronic Codebook
|
|
|
|
715) A __________ is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path
|
|
v client attack
|
|
> eavesdropping attack
|
|
> host attack
|
|
> Trojan horse attack
|
|
|
|
338) A _________ is a secret entry point into a program that allows someone who is aware of it to gain access without going through the usual security access procedures
|
|
Select one:
|
|
> multipartite
|
|
v backdoor
|
|
> hatch
|
|
> Trojan horse
|
|
|
|
1142) _________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.
|
|
> PHP attack
|
|
> Format string injection attack
|
|
> XSS attack
|
|
v Injection attack
|
|
|
|
105) Cryptographic systems are generically classified by _________
|
|
> the type of operations used for transforming plaintext to ciphertext
|
|
> the number of keys used
|
|
> the way in which the plaintext is processed
|
|
v all of the above
|
|
|
|
706) Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________
|
|
> identification step
|
|
v verification step
|
|
> authentication step
|
|
> corroboration step
|
|
|
|
317) A _________ is an individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account
|
|
Select one:
|
|
> Clandestine User
|
|
v Masquerader
|
|
> Sniffer
|
|
> Misfeasor
|
|
|
|
646) __________ houses cross-connects and active equipment for distributing cable to the equipment distribution area
|
|
> Main distribution area
|
|
> Equipment distribution area
|
|
v Horizontal distribution area
|
|
> Zone distribution area
|
|
|
|
280) _________ anomaly detection focuses on characterizing the past behavior of individual users or related groups of users and then detecting significant deviations
|
|
v Profile-based
|
|
> Statistical
|
|
> Behavioral
|
|
> Signature-based
|
|
|
|
238) _____ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder
|
|
> Traffic Analysis
|
|
> Payload Inspection
|
|
v Signature Detection
|
|
> Anomaly Detection
|
|
|
|
784) IPsec can assure that _________
|
|
> a router advertisement comes from an authorized router
|
|
> a routing update is not forged
|
|
> a redirect message comes from the router to which the initial packet was sent
|
|
v all of the above
|
|
|
|
83) The __________ algorithm will work against any block encryption cipher and does not depend on any particular property of DES
|
|
> counter mode attack
|
|
> ciphertext stealing
|
|
v meet-in-the-middle attack
|
|
> cipher block chaining
|
|
|
|
288) The __________ is the human with overall responsibility for setting the security policy of the organization, and, thus, for decisions about deploying and configuring the IDS
|
|
> hacker
|
|
v administrator
|
|
> analyst
|
|
> auditor
|
|
|
|
06) If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________
|
|
v use longer keys
|
|
> use shorter keys
|
|
> use more keys
|
|
> use less keys
|
|
|
|
1087) A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .
|
|
> integrity
|
|
v encryption
|
|
> analysis
|
|
> masquerade
|
|
|
|
010) A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key
|
|
v digital signature
|
|
> keystream
|
|
> one way hash function
|
|
> secret key
|
|
|
|
101) __________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key
|
|
> Session key
|
|
> Subkey
|
|
v Key distribution technique
|
|
> Ciphertext key
|
|
|
|
014) Combined one byte at a time with the plaintext stream using the XOR operation, a __________ is the output of the pseudorandom bit generator
|
|
v keystream
|
|
> digital signature
|
|
> secure hash
|
|
> message authentication code
|
|
|
|
385) To exploit any type of buffer overflow, the attacker needs to identify a buffer overflow vulnerability in some program that can be triggered using externally sourced data under the attacker's control
|
|
v True
|
|
> False
|
|
|
|
829) A ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals
|
|
Select one:
|
|
> moderate
|
|
v high
|
|
> normal
|
|
> low
|
|
|
|
268) The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central manager
|
|
> central manager agent
|
|
> LAN monitor agent
|
|
v host agent
|
|
> architecture agent
|
|
|
|
1115) If the analyst is able to get the source system to insert into the system a message chosen by the analyst,then a ________ attack is possible.
|
|
> known-plaintext
|
|
v chosen-plaintext
|
|
> chosen ciphertext
|
|
> chosen text
|
|
|
|
158) ________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number
|
|
> Collision attacks
|
|
> Preimage attacks
|
|
v Timing attacks
|
|
> Side-channel attacks
|
|
|
|
1083) the algorithm will produce a different output depending on the
|
|
specific secret key being used at the time.the exact substitutions
|
|
and transformations performed by the algorithm depend on the
|
|
key.
|
|
v True
|
|
> False
|
|
|
|
376) _________ can prevent buffer overflow attacks, typically of global data, which attempt to overwrite adjacent regions in the processes address space, such as the global offset table
|
|
> MMUs
|
|
> Heaps
|
|
v Guard Pages
|
|
|
|
1091) The _______ category is a transitional stage between awareness and training.
|
|
> roles and responsibilities relative to IT systems
|
|
v security basics and literacy
|
|
> education and experience
|
|
> security awareness
|
|
|
|
585) T/F: To create a relationship between two tables, the attributes that define the primary key in one table must appear as attributes in another table, where they are referred to as a foreign key
|
|
v True
|
|
> False
|
|
|
|
223) 5.0 Points
|
|
Since the responsibility for IT security is shared across the
|
|
organization, there is a risk of inconsistent implementation of security and a loss of central monitoring and control
|
|
v True
|
|
> False
|
|
|
|
261) A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity
|
|
v host-based IDS
|
|
> security intrusion
|
|
> network-based IDS
|
|
> intrusion detection
|
|
|
|
259) _________ are either individuals or members of a larger group of outsider attackers who are motivated by social or political causes
|
|
> State-sponsored organizations
|
|
v Activists
|
|
> Cyber criminals
|
|
> Others
|
|
|
|
153) Which of the following would allow an attack that to know the (plaintext of) current message must be the same as one previously transmitted because their ciphtertexts are the same?
|
|
> CBC
|
|
> CTR
|
|
> OFB
|
|
v ECB
|
|
|
|
464) Sometimes known as a "logic bomb", the __________ is the event or condition that determines when the payload is activated or delivered
|
|
> Firewall
|
|
> Router
|
|
> Antivirus software
|
|
> Encryption key
|
|
v trigger
|
|
|
|
013) The purpose of the DSS algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages
|
|
> True
|
|
v False
|
|
|
|
716) A __________ is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored
|
|
> eavesdropping attack
|
|
> denial-of-service attack
|
|
> client attack
|
|
v host attack
|
|
|
|
468) __________ code refers to programs that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics
|
|
> Obfuscated
|
|
> Scripting
|
|
> Legacy
|
|
v Mobile
|
|
> Open-source
|
|
|
|
276) The _________ to an IDS enables a user to view output from the system or control the behavior of the system
|
|
> command-line interface
|
|
> graphical user interface
|
|
> administrator console
|
|
v user interface
|
|
|
|
465) The four phases of a typical virus are: dormant phase, triggering phase, execution phase and __________ phase
|
|
> Initialization phase
|
|
> Recovery phase
|
|
v propagation
|
|
> Termination phase
|
|
> Mutation phase
|
|
|
|
265) _________ involves the collection of data relating to the behavior of legitimate users over a period of time
|
|
> Profile based detection
|
|
> Signature detection
|
|
> Threshold detection
|
|
v Anomaly detection
|
|
|
|
013) A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained
|
|
> mode of operation
|
|
> hash function
|
|
> cryptanalysis
|
|
v brute-force attack
|
|
|
|
012) A __________ is directed at the user file at the host where passwords, token passcodes, or biometric templates are store
|
|
> eavesdropping attack
|
|
> denial-of-service attack
|
|
> client attack
|
|
v host attack
|
|
|
|
642) A(n) __________ is a user who has administrative responsibility for part or all of the database
|
|
v administrator
|
|
> database relations manager
|
|
> application owner
|
|
> end user other than application owner
|
|
|
|
96) There are _____ modes of operation defined by NIST that are intended to cover virtually all the possible applications of encryption for which a block cipher could be used
|
|
> three
|
|
v five
|
|
> seven
|
|
> nine
|
|
|
|
30) The __________ component deals with the management and control of the ways entities are granted access to resources
|
|
> resource management
|
|
v access management
|
|
> privilege management
|
|
> policy management
|
|
|
|
325) _________ involves counting the number of occurrences of a specific event type over an interval of time
|
|
Select one:
|
|
v Threshold detection
|
|
> Rule-based detection
|
|
> Resource usage
|
|
> Profile-based system
|
|
|
|
282) _________ simulate human brain operation with neurons and synapse between them that classify observed data
|
|
> Antivirus software
|
|
> Intrusion prevention systems
|
|
v Neural networks
|
|
> Genetic algorithms
|
|
|
|
239) A _____ monitors the characteristics of a single host and the events occurring within that host for suspicious activity
|
|
> Network-based IDS
|
|
> Intrusion Prevention System
|
|
> Firewall
|
|
v Host-based IDS
|
|
|
|
832) A(n) _________ is an attempt to learn or make use of information from the system that does not affect system resources
|
|
Select one:
|
|
> active attack
|
|
> inside attack
|
|
> outside attack
|
|
v passive attack
|
|
|
|
507) ______ attempts to monopolize all of the available request handling threads on the Web server by sending HTTP requests that never complete
|
|
> HTTP
|
|
> Reflection attacks
|
|
> SYN flooding
|
|
v Slowloris
|
|
|
|
443) Gaps, or __________ , are flagged in the MMU as illegal addresses, and any attempt to access them results in the process being aborted
|
|
> Stack frames
|
|
> Heap blocks
|
|
v guard pages
|
|
> Code sections
|
|
|
|
1107) If the PRF does not generate effectively random 128-bit output values it may be possible for an adversary to narrow the possibilities and successfully use a brute force attack.
|
|
v True
|
|
> False
|
|
|
|
633) Network security is extremely important in a facility in which such a large collection of assets is concentrated in a single place and accessible by external network connections
|
|
v True
|
|
> False
|
|
|
|
07) __________ is a procedure that allows communicating parties to verify that received or stored messages are authentic
|
|
> Cryptanalysis
|
|
> Decryption
|
|
v Message authentication
|
|
> Collision resistance
|
|
|
|
85) _________ mode is similar to Cipher Feedback, except that the input to the encryption algorithm is the preceding DES output
|
|
> Counter
|
|
> Cipher Block Chaining
|
|
v Output Feedback
|
|
> Cipher Feedback
|
|
|
|
463) Sometimes referred to as the "infection vector", the __________ is the means by which a virus spreads or propagates
|
|
> Exploit
|
|
> Encryption algorithm
|
|
v infection mechanism
|
|
> Payload
|
|
> Backdoor
|
|
|
|
1122) the key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.
|
|
> one-way function
|
|
> time complexity
|
|
> chosen ciphertext
|
|
v man-in-the-middle
|
|
|
|
718) An institution that issues debit cards to cardholders and is responsible for the cardholder's account and authorizing transactions is the _________
|
|
> cardholder
|
|
> auditor
|
|
v issuer
|
|
> processor
|
|
|
|
378) A consequence of a buffer overflow error is:
|
|
> possibly memory access violation
|
|
> corruption of data used by the program
|
|
> unexpected transfer of control in the program
|
|
v all of these options
|
|
|
|
310) An operation such as login, read, perform, I/O or execute that is performed by the subject on or with an object is the _________ audit record field
|
|
v Action
|
|
> Subject
|
|
> Resource-usage
|
|
> Object
|
|
|
|
1077) the XtS-AES standard describes a method of decryption for data
|
|
stored in sector-based devices where the threat model includes
|
|
possible access to stored data by the adversary.
|
|
> True
|
|
v False
|
|
|
|
462) A computer __________ is a piece of software that can "infect" other programs or any type of executable content and tries to replicate itself
|
|
> Trojan horse
|
|
> Adware
|
|
v virus
|
|
> Worm
|
|
> Spyware
|
|
|
|
511) It is possible to specifically defend against the ______ by using a modified version of the TCP connection handling code
|
|
> three-way handshake
|
|
> UDP flood
|
|
v SYN spoofing attack
|
|
> flash crowd
|
|
|
|
015) A _________ protects against an attack in which one party generates a message for another party to sign
|
|
> data authenticator
|
|
v strong hash function
|
|
> weak hash function
|
|
> digital signature
|
|
|
|
644) __________ is the process of performing authorized queries and deducing unauthorized information from the legitimate responses received
|
|
> Perturbation
|
|
v Inference
|
|
> Compromise
|
|
> Partitioning
|
|
|
|
283) A ________ IDS monitors traffic at selected points on a network or interconnected set of networks
|
|
> host-based (HIDS)
|
|
> cloud-based (CIDS)
|
|
> application-based (AIDS)
|
|
v net-work based (NIDS)
|
|
|
|
27) __________ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization
|
|
v Constraints
|
|
> Mutually Exclusive Roles
|
|
> Cardinality
|
|
> Prerequisites
|
|
|
|
160) The principal attraction of ________ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead
|
|
> AES
|
|
v ECC
|
|
> Blowfish
|
|
> RC4
|
|
|
|
393) At the basic machine level, all of the data manipulated by machine instructions executed by the computer processor are stored in either the processors registers or in memory
|
|
v True
|
|
> False
|
|
|
|
1124) For determining the security of various elliptic curve
|
|
ciphers it is of some interest to know the number of
|
|
points in a finite abelian group defined over an elliptic
|
|
curve.
|
|
v True
|
|
> False
|
|
|
|
366) In 2004 the ________ exploited a buffer overflow in Microsoft Windows 2000/XP Local Security Authority Subsystem Service
|
|
> Code Red Worm
|
|
> Slammer Worm
|
|
> Morris Internet Worm
|
|
v Sasser Worm
|
|
|
|
694) User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic
|
|
> True
|
|
v False
|
|
|
|
421) __________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled
|
|
> threat modeling
|
|
v compile-time defenses
|
|
> runtime patching
|
|
> post-incident analysis
|
|
|
|
308) Metrics that are useful for profile-based intrusion detection are: counter, gauge, resource utilization, and _______
|
|
> network bandwidth
|
|
> packet loss rate
|
|
> system uptime
|
|
v interval timer
|
|
|
|
1440) __________ is a data collection technology that uses electronic tags attached to items to allow the items to be identified and tracked by a remote system.
|
|
v RFID
|
|
> NtRU
|
|
> EPC
|
|
> CRYPtOREC
|
|
|
|
827) An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user
|
|
Select one:
|
|
> repudiation
|
|
v masquerade
|
|
> inference
|
|
> interception
|
|
|
|
822) __________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts
|
|
Select one:
|
|
v Traffic padding
|
|
> Traffic integrity
|
|
> Traffic control
|
|
> Traffic routing
|
|
|
|
242) _____ involves the collection of data relating to the behavior of legitimate users over a period of time
|
|
> Signature Detection
|
|
> Statistical Analysis
|
|
> Log Monitoring
|
|
v Anomaly Detection
|
|
|
|
375) Even through it is a high-level programming language, Java still suffers from buffer overflows because it permits more data to be saved into a buffer than it has space for
|
|
> True
|
|
v False
|
|
|
|
775) ______ is the recommended technique for wireless network security
|
|
> Using encryption
|
|
> Using anti-virus and anti-spyware software
|
|
> Turning off identifier broadcasting
|
|
v All of the above
|
|
|
|
269) A(n) ________ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor
|
|
> passive sensor
|
|
> analysis sensor
|
|
> LAN sensor
|
|
v inline sensor
|
|
|
|
57) __________ is malware that encrypts the user's data and demands payment in order to access the key needed to recover the information
|
|
> Trojan horse
|
|
v Ransomware
|
|
> Crimeware
|
|
> Polymorphic
|
|
|
|
510) In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system
|
|
> SYN flood
|
|
v DNS amplification
|
|
> poison packet
|
|
> UDP flood
|
|
|
|
830) A __________ is any action that compromises the security of information owned by an organization
|
|
Select one:
|
|
v security attack
|
|
> security mechanism
|
|
> security policy
|
|
> security service
|
|
|
|
466) During the __________ phase the virus is activated to perform the function for which it was intended
|
|
> Encryption phase
|
|
> Stealth phase
|
|
> Payload phase
|
|
v triggering
|
|
> Replication phase
|
|
|
|
394) Even though it is a highlevel programming language, Java still suffers from buffer overflows because it permits more data to be saved into a buffer than it has space for
|
|
> True
|
|
v False
|
|
|
|
46) A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is __________
|
|
> Adobe
|
|
> Animoto
|
|
v Malware
|
|
> Prezi
|
|
|
|
106) A symmetric encryption scheme has five ingredients: plaintext, encryption algorithm, ciphertext, decryption algorithm and _________
|
|
> password
|
|
> hash
|
|
v secret key
|
|
> digital signature
|
|
|
|
648) _________ is an organization that produces data to be made available for controlled release, either within the organization or to external users
|
|
> Client
|
|
v Data owner
|
|
> User
|
|
> Server
|
|
|
|
114) Unlike ECB and CBC modes, ________ mode requires only the implementation of the encryption algorithm and not the decryption algorithm
|
|
> block
|
|
v counter (CTR)
|
|
> stream
|
|
> substitution
|
|
|
|
714) To counter threats to remote user authentication, systems generally rely on some form of ___________ protocol
|
|
> eavesdropping
|
|
> Trojan horse
|
|
v challenge-response
|
|
> denial-of-service
|
|
|
|
1104) Plaintext is recovered from the ciphertext using the paired key and _____________ .
|
|
> a digital signature
|
|
> a recovery encryption
|
|
v a decryption algorithm
|
|
> an encryption algorithm
|
|
|
|
115) The most powerful, and most common, approach to countering the threats to network security is ________
|
|
> authentication
|
|
> firewall implementation
|
|
> intrusion detection
|
|
v encryption
|
|
|
|
442) The _________ is typically located above the program code and global data and grows up in memory (while the sack grows down toward it)
|
|
> Data section
|
|
> Cache
|
|
v heap
|
|
> Register file
|
|
|
|
369) _________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled
|
|
> Run-time defenses
|
|
v Compile-time defenses
|
|
> Shellcodes
|
|
> All of these answers
|
|
|
|
821) Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences
|
|
Select one:
|
|
> unauthorized disclosure
|
|
> disruption
|
|
v deception
|
|
> usurpation
|
|
|
|
348) _________ are used to attack networked computer systems with a large volume of traffic to carry out a denial-of-service attack
|
|
Select one:
|
|
> Bots
|
|
> Exploits
|
|
> Keyloggers
|
|
v flooders
|
|
|
|
275) A ________ is a hacker with sufficient technical skills to modify and extend attack toolkits to use newly discovered vulnerabilities
|
|
> script kiddie
|
|
v journeyman
|
|
> novice
|
|
> expert
|
|
|
|
1101) The appeal of HMAC is that its designers have been able to prove an
|
|
exact relationship between the strength of the embedded hash function and the strength of HMAC.
|
|
v True
|
|
> False
|
|
|
|
21) A concept that evolved out of requirements for military information security is ______
|
|
> reliable input
|
|
v mandatory access control
|
|
> open and closed policies
|
|
> discretionary input
|
|
|
|
287) 14.________ are decoy systems that are designed to lure a potential attacker away from critical systems
|
|
> Antivirus software
|
|
v Honeypots
|
|
> Firewalls
|
|
> Intrusion Detection Systems
|
|
|
|
48) A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met
|
|
v logic bomb
|
|
> trapdoor
|
|
> worm
|
|
> Trojan horse
|
|
|
|
315) To be of practical use an intrusion detection system should detect a substantial percentage of intrusions while keeping the false alarm rate at an acceptable level
|
|
v True
|
|
> False
|
|
|
|
118) For symmetric encryption to work the two parties to an exchange must share the same _____, which must be protected from access by others
|
|
> username
|
|
v key
|
|
> password
|
|
> certificate
|
|
|
|
380) The potential for a buffer overflow exists anywhere that data is copied or merged into a buffer, where at least some of the data are read from outside the program
|
|
v True
|
|
> False
|
|
|
|
471) A bot can use a __________ to capture keystrokes on the infected machine to retrieve sensitive information
|
|
> Antivirus software
|
|
> Encryption key
|
|
v keylogger
|
|
> Firewall
|
|
> Rootkit
|
|
|
|
828) The assurance that data received are exactly as sent by an authorized entity is __________
|
|
Select one:
|
|
v data integrity
|
|
> data confidentiality
|
|
> authentication
|
|
> access control
|
|
|
|
833) The _________ prevents or inhibits the normal use or management of communications facilities
|
|
Select one:
|
|
> passive attack
|
|
v denial of service
|
|
> masquerade
|
|
> traffic encryption
|
|
|
|
1128) Intrusion detection is the process of collecting information about
|
|
events occurring in a computer system or network and analyzing them for signs of intrusions.
|
|
v True
|
|
> False
|
|
|
|
504) _______ bandwidth attacks attempt to take advantage of the disproportionally large resource consumption at a server
|
|
v Application-based
|
|
> System-based
|
|
> Random
|
|
> Amplification
|
|
|
|
499) ______ relates to the capacity of the network links connecting a server to the wider Internet
|
|
> Application resource
|
|
v Network bandwidth
|
|
> System payload
|
|
> Directed broadcast
|
|
|
|
440) A _________ value is named after the miner's bird used to detect poisonous air in a mine and warn miners in time for them to escape
|
|
> Sparrow
|
|
> Falcon
|
|
> Hawk
|
|
v canary
|
|
> Eagle
|
|
|
|
384) The buffer overflow type of attack has been known since it was first widely used by the _______ Worm in 1988
|
|
> Alpha One
|
|
> Code Red Worm
|
|
> Slammer Worm
|
|
v Morris Internet Worm
|
|
|
|
423) _________ is a form of overflow attack
|
|
v heap overflows, return to system call, and replacement stack frame
|
|
> Cross-site scripting (XSS)
|
|
> SQL injection
|
|
> Directory traversal
|
|
|
|
412) A buffer overflow in Microoft Windows 2000/XP Local Security Authority Subsystem Service was exploited by the _________
|
|
> Melissa Worm
|
|
v Sasser Worm
|
|
> Nimda Worm
|
|
> Sobig Worm
|
|
|
|
240) A(n) _____ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor
|
|
> Active Sensor
|
|
> Probe
|
|
v Inline Sensor
|
|
> Passive Sensor
|
|
|
|
868) The Common Criteria for Information Technology and Security Evaluation are ISO standards for specifying security requirements and defining evaluation criteria
|
|
v True
|
|
> False
|
|
|
|
228) The relative lack of success in bringing cybercriminals to justice has led to an increase in their numbers, boldness, and the global scale of their operations
|
|
v True
|
|
> False
|
|
|
|
579) The basic building block of a __________ is a table of data, consisting of rows and columns, similar to a spreadsheet
|
|
v relational database
|
|
> query set
|
|
> DBMS
|
|
> perturbation
|
|
|
|
329) A ______ attack is an attempt to prevent legitimate users of a service from using that service
|
|
> Man-in-the-middle
|
|
> Phishing
|
|
v Denial of service (DOS)
|
|
> Social engineering
|
|
|
|
506) Bots starting from a given HTTP link and then following all links on the provided Web site in a recursive way is called _______
|
|
> trailing
|
|
v spidering
|
|
> spoofing
|
|
> crowding
|
|
|
|
271) _________ is a document that describes the application level protocol for exchanging data between intrusion detection entities
|
|
v RFC 4767
|
|
> RFC 4766
|
|
> RFC 4765
|
|
> RFC 4764
|
|
|
|
581) __________ is an organization that receives the encrypted data from a data owner and makes them available for distribution to clients
|
|
> User
|
|
> Client
|
|
> Data owner
|
|
v Server
|
|
|
|
06) Modes of operation are the alternative techniques that have been developed to increase the security of symmetric block encryption for large sequences of data
|
|
v True
|
|
> False
|
|
|
|
343) A _________ virus is a form of virus explicitly designed to hide itself from detection by antivirus software
|
|
Select one:
|
|
v stealth
|
|
> polymorphic
|
|
> encrypted
|
|
> metamorphic
|
|
|
|
157) ________ attacks have several approaches, all equivalent in effort to factoring the product of two primes
|
|
v Mathematical
|
|
> Statistical
|
|
> Brute-force
|
|
> Social engineering
|
|
|
|
841) Computer security is essentially a battle of wits between a perpetrator
|
|
who tries to find holes and the administrator who tries to close them
|
|
True or False
|
|
v True
|
|
> False
|
|
|
|
897) An attacker can generally determine in advance exactly where the targeted buffer will be located in the stack frame of teh function in which it is defined
|
|
> True
|
|
v False
|
|
|
|
1043) Which stages does a virus have?
|
|
> Dormant phase
|
|
> Propagation phase - i.e. attachment to email
|
|
> Triggering phase
|
|
> Execution phase
|
|
v All viruses have these four stages
|
|
|
|
267) The _________ module analyzes LAN traffic and reports the results to the central manager
|
|
v LAN monitor agent
|
|
> host agent
|
|
> central manager agent
|
|
> architecture agent
|
|
|
|
1134) Message authentication protects two parties who exchange
|
|
messages from any third party, however, it does not protect the
|
|
two parties against each other.
|
|
v True
|
|
> False
|
|
|
|
645) A ___________ is the portion of the data center that houses data processing equipment
|
|
v computer room
|
|
> main distribution area
|
|
> entrance room
|
|
> horizontal distribution
|
|
|
|
377) The ________________ used a buffer overflow exploit in the "fingerd" as one of its attack mechanisms
|
|
v Morris Internet Worm
|
|
> Sasser Worm
|
|
> Code Red Worm
|
|
> Slammer Worm
|
|
|
|
470) A __________ is a collection of bots capable of acting in a coordinated manner
|
|
v botnet
|
|
> Firewall
|
|
> Encryption algorithm
|
|
> Intrusion Detection System (IDS)
|
|
> Rootkit
|
|
|
|
11) A user program executes in a kernel mode in which certain areas of memory are protected from the user's use and certain instructions may not be executed
|
|
> True
|
|
v False
|
|
|
|
1116) The BLP model effectively breaks down when (untruste> low classified
|
|
executable data are allowed to be executed by a high clearance (truste> subject.
|
|
v True
|
|
> False
|
|
|
|
1089) To emphasize the importance of security awareness,an organization
|
|
should have a security awareness policy document that is provided to all employees.
|
|
v True
|
|
> False
|
|
|
|
76) In the first instance of multiple encryption plaintext is converted to __________ using the encryption algorithm
|
|
v ciphertext
|
|
> S-AES mode
|
|
> Triple DES
|
|
> block cipher
|
|
|
|
161) Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified
|
|
v True
|
|
> False
|
|
|
|
92) The exact substitutions and transformations performed by the algorithm depend on the ________
|
|
> ciphertext
|
|
> decryption algorithm
|
|
v secret key
|
|
> encryption algorithm
|
|
|
|
127) A hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret key
|
|
v True
|
|
> False
|
|
|
|
109) A ________ cipher processes the input elements continuously, producing output one element at a time as it goes along
|
|
> substitution
|
|
> block
|
|
v stream
|
|
> transposition
|
|
|
|
1078) Once the plaintext is converted to ciphertext using the
|
|
encryption algorithm the plaintext is then used as input and the algorithm is applied again.
|
|
> True
|
|
v False
|
|
|
|
692) Depending on the details of the overall authentication system, the registration authority issues some sort of electronic credential to the subscriber
|
|
> True
|
|
v False
|
|
|
|
713) Each individual who is to be included in the database of authorized users must first be __________ in the system
|
|
> verified
|
|
> authenticated
|
|
> identified
|
|
v enrolled
|
|
|
|
397) An attacker is more interested in transferring control to a location and code of the attackers choosing rather than immediately crashing the program
|
|
v True
|
|
> False
|
|
|
|
307) Password files can be protected in one of two ways: One-way function or ______
|
|
> biometric authentication
|
|
v access control
|
|
> encryption
|
|
> two-factor authentication
|
|
|
|
719) __________ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide
|
|
v EFT
|
|
> POS
|
|
> BTM
|
|
> ATF
|
|
|
|
012) Digital signatures and key management are the two most important applications of __________ encryption
|
|
> private-key
|
|
v public-key
|
|
> preimage resistant
|
|
> advanced
|
|
|
|
647) __________ encompasses intrusion detection, prevention and response
|
|
v Intrusion management
|
|
> Security assessments
|
|
> Database access control
|
|
> Data loss prevention
|
|
|
|
820) A threat action in which sensitive data are directly released to an unauthorized entity is __________
|
|
Select one:
|
|
> disruption
|
|
v exposure
|
|
> corruption
|
|
> intrusion
|
|
|
|
12) Any program that is owned by, and SetUID to, the "superuser" potentially grants unrestricted access to the system to any user executing that program
|
|
v True
|
|
> False
|
|
|
|
08) The purpose of a __________ is to produce a “fingerprint” of a file, message, or other block of data
|
|
> secret key
|
|
> digital signature
|
|
> keystream
|
|
v hash function
|
|
|
|
04) On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack
|
|
> one-fourth
|
|
v half
|
|
> two-thirds
|
|
> three-fourths
|
|
|
|
759) A traditional packet filter makes filtering decisions on an individual packet basis and does not take into consideration any higher layer context
|
|
v True
|
|
> False
|
|
|
|
270) A(n) ________ event is an alert that is generated when the gossip traffic enables a platform to conclude that an attack is under way
|
|
> PEP
|
|
v DDI
|
|
> IDEP
|
|
> IDME
|
|
|
|
1172) __________ defines user authentication as "the process of verifying an identity claimed by or for a system entity".
|
|
v RFC 2828
|
|
> RFC 2493
|
|
> RFC 2298
|
|
> RFC 2328
|
|
|
|
370) In 2003, the _______ exploited a buffer overflow in Microsoft SQL Server 2000
|
|
> Slammer worm
|
|
> Sasser worm
|
|
> Morris Internet Worm
|
|
> Code Red Worm
|
|
v Slammer Worm
|
|
|
|
1118) Multilevel security is of interest when there is a requirement to maintain a
|
|
resource in which multiple levels of data sensitivity are defined.
|
|
v True
|
|
> False
|
|
|
|
410) The __________ used a buffer overflow exploit in fingerd as one of its attack mechanisms
|
|
> Conficker Worm
|
|
v Morris Internet Worm
|
|
> Stuxnet Worm
|
|
> ILOVEYOU Worm
|
|
|
|
108) A ________ cipher processes the input one block of elements at a time, producing an output block for each input
|
|
> substitution
|
|
v block
|
|
> stream
|
|
> transposition
|
|
|
|
212) A cookie can be used to authenticate a user to a web site so that the user does not have to type in his password for each connection to the site
|
|
v True
|
|
> False
|
|
|
|
1163) The countermeasure to tiny fragment attacks is to discard packets with
|
|
an inside source address if the packet arrives on an external interface.
|
|
> True
|
|
v False
|
|
|
|
140) Which of the following scenario requires a security protocol:
|
|
> log in to mail.google.com
|
|
> connecting to work from home using a VPN
|
|
v All the previous answers
|
|
|
|
274) The broad classes of intruders are: cyber criminals, state-sponsored organizations, _________ , and others
|
|
> terrorists
|
|
> script kiddies
|
|
v activists
|
|
> hackers
|
|
|
|
1095) Performing regular backups of data on a system is a critical control
|
|
that assists with maintaining the integrity of the system and user data.
|
|
v True
|
|
> False
|
|
|
|
594) T/F: Business continuity consists of security services that allocate access, distribute, monitor, and protect the underlying resource services
|
|
> True
|
|
v False
|
|
|
|
01) __________ defines user authentication as “the process of verifying an identity claimed by or for a system entity”
|
|
v RFC 4949
|
|
> RFC 2298
|
|
> RFC 2493
|
|
> RFC 2328
|
|
|
|
427) The buffer is located __________
|
|
> in the heap
|
|
> in the stack
|
|
> in the data section of the process
|
|
> in the register
|
|
> All of the above
|
|
v 1,2,3 are correct
|
|
|
|
162) To be of practical use an IDS should detect a substantial percentage of intrusions while keeping the false alarm rate at an acceptable level
|
|
v True
|
|
> False
|
|
|
|
132) In Kerberos, each human user has a master key shared with the authentication server, and the key is usually derived from the user's password
|
|
v True
|
|
> False
|
|
|
|
712) __________ systems identify features of the hand, including shape, and lengths and widths of fingers
|
|
> Signature
|
|
v Hand geometry
|
|
> Fingerprint
|
|
> Palm print
|
|
|
|
155) Which of the following feature can only be provided by public-key cryptography?
|
|
> Data integrity
|
|
> Confidentiality
|
|
> Digital signatures
|
|
v None of the above
|
|
|
|
401) The buffer overflow type of attack has been known since it was first widely used by the __________ Worm in 1988
|
|
v Morris
|
|
> Slammer
|
|
> Code Red
|
|
> Heartbleed
|
|
|
|
707) Recognition by fingerprint, retina, and face are examples of __________
|
|
> face recognition
|
|
> dynamic biometrics
|
|
v static biometrics authentication
|
|
> token
|
|
|
|
306) The three classes of intruders identified by Anderson are: Masquerader, Misfeasor, and____
|
|
> Insider threat
|
|
> Social engineer
|
|
v clandestine
|
|
> Cybercriminal
|
|
|
|
513) When a DoS attack is detected, the first step is to _______
|
|
v identify the attack
|
|
> analyze the response
|
|
> design blocking filters
|
|
> shut down the network
|
|
|
|
373) Buffer overflows can be found in a wide variety of programs, processing a range of different input and with a variety of possible responses
|
|
v True
|
|
> False
|
|
|
|
309) Two types of audit records used are Detection-specific audit records and ____ audit records
|
|
> system uptime
|
|
v native
|
|
> network bandwidth
|
|
> packet loss rate
|
|
|
|
102) A ________ is a key used between entities for the purpose of distributing session keys
|
|
v permanent key
|
|
> session key
|
|
> distribution key
|
|
> all of the above
|
|
|
|
1074) A __________ is a set in which you can do addition, subtraction, multiplication and division without leaving the set.
|
|
> record
|
|
> standard
|
|
v field
|
|
> block
|
|
|
|
202) In a wireless network, traffic is broadcasted into the air, and so it is much easier to sniff wireless traffic compared with wired traffic
|
|
v True
|
|
> False
|
|
|
|
1113) Defensive programming is sometimes referred to as _________.
|
|
> variable programming
|
|
v secure programming
|
|
> interpretive programming
|
|
> chroot programming
|
|
|
|
18) _________ is the granting of a right or permission to a system entity to access a system resource
|
|
v Authorization
|
|
> Authentication
|
|
> Control
|
|
> Monitoring
|
|
|
|
1119) IPSec can guarantee that all traffic designated by the network
|
|
administrator is authenticated but cannot guarantee that it is
|
|
encrypted.
|
|
> True
|
|
v False
|
|
|
|
33) Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics
|
|
> True
|
|
v False
|
|
|
|
381) Memory is requested from the ______ by programs for use in dynamic data structures, such as linked lists of records
|
|
> ROM
|
|
v heap
|
|
> address space
|
|
> shell
|
|
|
|
117) With ______ encryption each vulnerable communications link is equipped on both ends with an encryption device
|
|
> network
|
|
> end-to-end
|
|
v link
|
|
> transport
|
|
|
|
351) The success of the digital immune system depends on the ability of the virus analysis machine to detect new and innovative virus strains
|
|
v True
|
|
> False
|
|
|
|
91) _________ is the original message or data that is fed into the algorithm as input
|
|
v Plaintext
|
|
> Encryption algorithm
|
|
> Decryption algorithm
|
|
> Ciphertext
|
|
|
|
1166) Signature-based approaches attempt to define normal,or expected,
|
|
behavior,whereas anomaly approaches attempt to define proper behavior.
|
|
> True
|
|
v False
|
|
|
|
143) A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained
|
|
v True
|
|
> False
|
|
|
|
1138) the __________ generation is usually thought of as the Iot and is marked by the use of billions of embedded devices.
|
|
> second
|
|
> third
|
|
v fourth
|
|
> fifth
|
|
|
|
1158) A denial-of-service attack is an attempt to compromise availability by
|
|
hindering or blocking completely the provision of some service.
|
|
v True
|
|
> False
|
|
|
|
321) Intrusion detection involves detecting unusual patterns of activity or patterns of activity that are known to correlate with intrusions
|
|
v True
|
|
> False
|
|
|
|
577) Encryption can be applied to the entire database, at the record level, at the attribute level, or at the level of the individual field
|
|
v True
|
|
> False
|
|
|
|
266) A (n) __________ is a hacker with minimal technical skill who primarily uses existing attack toolkits
|
|
> Master
|
|
v Apprentice
|
|
> Journeyman
|
|
> Activist
|
|
|
|
424) The __________ used a buffer overflow exploit in "fingerd" as one of its attack
|
|
> Code Red Worm
|
|
> Stuxnet Worm
|
|
v Morris Internet Worm
|
|
> ILOVEYOU Worm
|
|
|
|
632) Site security of the data center itself includes barriers to entry, coupled with authentication techniques for gaining physical access
|
|
> True
|
|
v False
|
|
|
|
285) 12.The functional components of an _________ are: data source, sensor, analyzer, administration, manager, and operator
|
|
v IDS
|
|
> IPS
|
|
> SIEM
|
|
> Firewall
|
|
|
|
139) The purposes of a security protocol include:
|
|
> Authentication
|
|
> Key-exchange
|
|
> Negotiate crypto algorithms and parameters
|
|
v All the previous answers
|
|
|
|
1106) there are well-defined tests for determining uniform distribution
|
|
and independence to validate that a sequence of numbers is
|
|
random.
|
|
> True
|
|
v False
|
|
|
|
1082) The first widely used occurrence of the buffer overflow attack was the _______.
|
|
> Code Red Worm
|
|
v Morris Internet Worm
|
|
> Sasser Worm
|
|
> Slammer Worm
|
|
|
|
29) Subject attributes, object attributes and environment attributes are the three types of attributes in the __________ model
|
|
> DSD
|
|
> RBAC
|
|
v ABAC
|
|
> SSD
|
|
|
|
63) A mode of operation is a technique for enhancing the effect of a cryptographic algorithm or adapting the algorithm for an application
|
|
v True
|
|
> False
|
|
|
|
272) The rule _______ tells Snort what to do when it finds a packet that matches the rule criteria
|
|
> protocol
|
|
> direction
|
|
v action
|
|
> destination port
|
|
|
|
640) A _________ is defined to be a portion of a row used to uniquely identify a row in a table
|
|
> foreign key
|
|
> query
|
|
v primary key
|
|
> data perturbation
|
|
|
|
211) Since Android is open-source, each handset vendor can customize it, and this is good for security (hint: consider security updates)
|
|
> True
|
|
v False
|
|
|
|
010) The strength of a hash function against brute-force attacks depends
|
|
solely on the length of the hash code produced by the algorithm
|
|
v True
|
|
> False
|
|
|
|
138) The DSS makes use of the _______ and presents a new digital signature technique, the Digital Signature Algorithm (DSA)
|
|
> AES
|
|
v SHA-1
|
|
> MD5
|
|
> RSA
|
|
|
|
428) _________ is a tool used to automatically identify potentially vulnerable programs
|
|
> Code obfuscation
|
|
> Encryption
|
|
v fuzzing
|
|
> Penetration testing
|
|
|
|
80) __________ modes of operation have been standardized by NIST for use with symmetric block ciphers such as DES and AES
|
|
> Nine
|
|
> Seven
|
|
> Three
|
|
v Five
|
|
|
|
467) A __________ virus is explicitly designed to hide itself from detection by anti-virus software
|
|
> Adware
|
|
> Spyware
|
|
> Rootkit
|
|
v stealth
|
|
> Ransomware
|
|
|
|
116) With _________ encryption the encryption process is carried out at the two end systems
|
|
> point-to-point
|
|
> intermediary
|
|
> centralized
|
|
v end-to-end
|
|
|
|
119) All encryption algorithms are based on two general principles: substitution and _________
|
|
> compression
|
|
> expansion
|
|
v transposition
|
|
> permutation
|
|
|
|
01) The original message or data that is fed into the algorithm is __________
|
|
> encryption algorithm
|
|
> secret key
|
|
> decryption algorithm
|
|
v plaintext
|
|
|
|
100) ______ mode is typically used for a general-purpose block-oriented transmission and is useful for high-speed requirements
|
|
> ECB
|
|
> OFB
|
|
> CFB
|
|
v CTR
|
|
|
|
323) System administrators can stop all attacks and hackers from penetrating their systems by installing software patches periodically
|
|
> True
|
|
v False
|
|
|
|
217) In XSRF, the malicious site can send malicious script to execute in the user?s browser by embedding the script in a hidden iframe
|
|
> True
|
|
v False
|
|
|
|
634) Security specifically tailored to databases is an increasingly important component of an overall organizational security strategy
|
|
v True
|
|
> False
|
|
|
|
836) Computer security is protection of the integrity, availability, and
|
|
confidentiality of information system resources
|
|
True or False
|
|
v True
|
|
> False
|
|
|
|
1137) A major characteristic of a good security program is how quickly
|
|
the Iot system can be recovered after an incident has occurred.
|
|
v True
|
|
> False
|
|
|
|
1121) Additional padding may be added to provide partial traffic-flow
|
|
confidentiality by concealing the actual length of the payload.
|
|
v True
|
|
> False
|
|
|
|
03) Cryptanalytic attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtaine
|
|
> True
|
|
v False
|
|
|
|
69) A typical application of Output Feedback mode is stream oriented transmission over noisy channel, such as satellite communication
|
|
v True
|
|
> False
|
|
|
|
650) __________ specifies the minimum requirements for telecommunications infrastructure of data centers
|
|
v TIA-492
|
|
> RFC-4949
|
|
> NIST-7883
|
|
> RSA-298
|
|
|
|
147) Using PKCS (public-key cryptography standard), when RSA encrypts the same message twice, different ciphertexts will be produced
|
|
v True
|
|
> False
|
|
|
|
943) Four stages of viruses
|
|
> Dormant phase
|
|
> Propagation phase - i.e. attachment to email
|
|
> Triggering phase
|
|
> Execution phase
|
|
v All of the above
|
|
|
|
437) __________ defenses aim to detect and abort attacks in existing programs
|
|
> Code signing
|
|
v run-time
|
|
> Compile-time defenses
|
|
> Patch management
|
|
|
|
1162) The firewall may be a single computer system or a set of two or more
|
|
systems that cooperate to perform the firewall function.
|
|
v True
|
|
> False
|
|
|
|
82) The simplest form of multiple encryption has __________ encryption stages and __________ keys
|
|
> three, two
|
|
> four, two
|
|
> two, three
|
|
v two, two
|
|
|
|
304) Statistical approaches attempt to define proper behavior and rule-based approaches attempt to define normal or expected behavior
|
|
> True
|
|
v False
|
|
|
|
17) __________ is verification that the credentials of a user or other system entity are valid
|
|
> Adequacy
|
|
v Authentication
|
|
> Authorization
|
|
> Audit
|
|
|
|
711) The most common means of human-to-human identification are __________
|
|
v facial characteristics
|
|
> signatures
|
|
> retinal patterns
|
|
> fingerprints
|
|
|
|
1155) In relational database parlance,the basic building block is a __________,which is a flat table.
|
|
> attribute
|
|
> tuple
|
|
> primary key
|
|
v relation
|
|
|
|
1159) Using forged source addresses is known as _________.
|
|
v source address spoofing
|
|
> a three-way address
|
|
> random dropping
|
|
> directed broadcast
|
|
|
|
1432) "Each block of 64 plaintext bits is encoded independently using the
|
|
same key" is a description of the CBC mode of operation.
|
|
> True
|
|
v False
|
|
|
|
126) Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES and AES
|
|
v True
|
|
> False
|
|
|
|
95) The most widely used encryption scheme is based on the _________ adopted in 1977 by the National Bureau of Standards
|
|
> AES
|
|
> 3DES
|
|
> CES
|
|
v DES
|
|
|
|
939) If we find that a botnet server is located in country X, we can be certain that criminals within country X control the botnet
|
|
> True
|
|
v False
|
|
|
|
169) The strength of a hash function against brute-force attacks depends on the length of the hash code produced by the algorithm
|
|
v True
|
|
> False
|
|
|
|
05) The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________
|
|
> SHA
|
|
> RSA
|
|
v AES
|
|
> DSS
|
|
|
|
229) The purpose of the privacy functions is to provide a user protection against discovery and misuse of identity by other users
|
|
v True
|
|
> False
|
|
|
|
1123) the __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME.
|
|
> Rabin
|
|
> Rijnedel
|
|
> Hillman
|
|
v ElGamal
|
|
|
|
1052) TCB Design Principles
|
|
> Least Privilege
|
|
> Economy
|
|
> Open Design
|
|
> Complete Mediation
|
|
> Fail-safe defaults
|
|
> Ease of Use
|
|
v All of the above
|
|
|
|
438) The __________ project produces a free, multiplatform 4.4BSD-based UNIX-like operating system
|
|
> Linux
|
|
> Windows
|
|
v OpenBSD
|
|
> macOS
|
|
> FreeBSD
|
|
|
|
58) A __________ attack is a bot attack on a computer system or network that causes a loss of service to users
|
|
> spam
|
|
> phishing
|
|
v DDoS
|
|
> sniff
|
|
|
|
328) Stealth is not a term that applies to a virus as such but, rather, refers to a technique used by a virus to evade detection
|
|
v True
|
|
> False
|
|
|
|
411) In 2003 the _________ exploited a buffer overflow in Microsoft SQL Server 2000
|
|
> Code Red Worm
|
|
> Mydoom Worm
|
|
> Blaster Worm
|
|
v Slammer Worm
|
|
|
|
1131) A recipient in possession of the secret key cannot generate an
|
|
authentication code to verify the integrity of the message.
|
|
> True
|
|
v False
|
|
|
|
831) A loss of _________ is the unauthorized disclosure of information
|
|
Select one:
|
|
> integrity
|
|
> availability
|
|
v confidentiality
|
|
> authenticity
|
|
|
|
335) An encrypted virus is a virus that mutates with every infection, making detection by the signature of the virus impossible
|
|
> True
|
|
v False
|
|
|
|
934) The best defense against being an unwitting participant in a DDos attack is to prevent your systems from being compromised
|
|
v True
|
|
> False
|
|
|
|
112) ______ was designed in 1987 by Ron Rivest and is a variable key-size stream cipher with byte-oriented operations
|
|
> DES
|
|
v RC4
|
|
> AES
|
|
> RSA
|
|
|
|
1090) Security awareness,training,and education programs may be needed to
|
|
comply with regulations and contractual obligations.
|
|
v True
|
|
> False
|
|
|
|
77) Triple DES makes use of __________ stages of the DES algorithm, using a total of two or three distinct keys
|
|
> twelve
|
|
> six
|
|
> nine
|
|
v three
|
|
|
|
436) __________ defenses aim to harden programs to resist attacks in new programs
|
|
> Machine code
|
|
> Obfuscated
|
|
> Self-modifying
|
|
v compile-time
|
|
|
|
150) Just like RSA can be used for signature as well as encryption, Digital Signature Standard can also be used for encryption
|
|
> True
|
|
v False
|
|
|
|
55) __________ is the first function in the propagation phase for a network worm
|
|
> Propagating
|
|
v Fingerprinting
|
|
> Keylogging
|
|
> Spear phishing
|
|
|
|
717) A __________ attack involves an adversary repeating a previously captured user response
|
|
> client
|
|
v replay
|
|
> Trojan horse
|
|
> eavesdropping
|
|
|
|
578) A(n) __________ is a structured collection of data stored for use by one or more applications
|
|
> attribute
|
|
v database
|
|
> tuple
|
|
> inference
|
|
|
|
837) Data integrity assures that information and programs are changed only
|
|
in a specified and authorized manner
|
|
True or False
|
|
v True
|
|
> False
|
|
|
|
216) XSRF is possible when a user has a connection to a malicious site while a connection to a legitimate site is still alive
|
|
v True
|
|
> False
|
|
|
|
1125) Limited characteristics make it impossible for hash functions to be
|
|
used to determine whether or not data has changed.
|
|
> True
|
|
v False
|
|
|
|
120) The three most important symmetric block ciphers are: 3DES, AES, and _____
|
|
> Serpent
|
|
v Data Encryption Standard (DES)
|
|
> Blowfish
|
|
> RSA
|
|
|
|
795) The principal objective for developing a PKI is to enable secure, convenient, and efficient acquisition of private keys
|
|
> True
|
|
v False
|
|
|
|
278) An IDS comprises three logical components: analyzers, user interface and _____
|
|
v sensors
|
|
> firewalls
|
|
> routers
|
|
> encryption algorithms
|
|
|
|
1129) One limitation of a firewall is that an improperly secured wireless
|
|
LAN may be accessed from outside the organization.
|
|
v True
|
|
> False
|
|
|
|
41) A Trojan horse is an apparently useful program containing hidden code that, when invoked, performs some harmful function
|
|
v True
|
|
> False
|
|
|
|
698) Depending on the application, user authentication on a biometric system involves either verification or identification
|
|
v True
|
|
> False
|
|
|
|
382) A stack buffer overflow attack is also referred to as ______
|
|
> buffer overrunning
|
|
> stack framing
|
|
> heap overflowing
|
|
v stack smashing
|
|
|
|
78) Another important mode, XTS-AES, has been standardized by the __________ Security in Storage Working Group
|
|
> NIST
|
|
v IEEE
|
|
> ITIL
|
|
> ISO
|
|
|
|
72) It is possible to convert a block cipher into a stream cipher using cipher feedback, output feedback and counter modes
|
|
v True
|
|
> False
|
|
|
|
1105) A major advance in symmetric cryptography occurred with the
|
|
development of the rotor encryption/decryption machine.
|
|
v True
|
|
> False
|
|
|
|
1108) A widely used technique for pseudorandom number generation is
|
|
an algorithm known as the linear congruential method.
|
|
v True
|
|
> False
|
|
|
|
26) A __________ is a named job function within the organization that controls this computer system
|
|
> user
|
|
v role
|
|
> permission
|
|
> session
|
|
|
|
1126) the Secure Hash Algorithm design closely models, and is based on, the hash function __________ .
|
|
> MD5
|
|
> FIPS 180
|
|
> RFC 4634
|
|
v MD4
|
|
|
|
09) __________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n
|
|
> DSS
|
|
v RSA
|
|
> SHA
|
|
> AES
|
|
|
|
349) Malicious software that needs a host program is referred to as _________
|
|
Select one:
|
|
> blended
|
|
v parasitic
|
|
> logic bomb
|
|
> flooders
|
|
|
|
701) Identifiers should be assigned carefully because authenticated identities are the basis for other security services
|
|
v True
|
|
> False
|
|
|
|
79) The _________ and _________ block cipher modes of operation are used for authentication
|
|
> OFB, CTR
|
|
v CBC, CFB
|
|
> CFB, OFB
|
|
> ECB, CBC
|
|
|
|
865) A subject can exercise only accesses for which it has the necessary authorization and which satisfy the MAC rules
|
|
v True
|
|
> False
|
|
|
|
1111) Data representing behavior that does not trigger an alarm cannot serve as input to intrusion detection analysis.
|
|
> True
|
|
v False
|
|
|
|
1112) Security flaws occur as a consequence of sufficient checking and validation of data and error codes in programs.
|
|
> True
|
|
v False
|
|
|
|
107) _________ is the process of attempting to discover the plaintext or key
|
|
v Cryptanalysis
|
|
> Steganography
|
|
> Cryptography
|
|
> Hashing
|
|
|
|
133) In Kerberos, the purpose of using ticket-granting-ticket (TGT) is to minimize the exposure of a user?s master key
|
|
v True
|
|
> False
|
|
|
|
1135) the main work for signature generation depends on the message
|
|
and is done during the idle time of the processor.
|
|
> True
|
|
v False
|
|
|
|
02) The __________ is the encryption algorithm run in reverse
|
|
v decryption algorithm
|
|
> plaintext
|
|
> ciphertext
|
|
> encryption algorithm
|
|
|
|
15) An ABAC model can define authorizations that express conditions on properties of both the resource and the subject
|
|
v True
|
|
> False
|
|
|
|
1169) A bot propagates itself and activates itself,whereas a worm is initially
|
|
controlled from some central facility.
|
|
> True
|
|
v False
|
|
|
|
560) T/F: SQL Server allows users to create roles that can then be assigned access rights to portions of the database
|
|
v True
|
|
> False
|
|
|
|
320) Unauthorized intrusion into a computer system or network is one of the most serious threats to computer security
|
|
v True
|
|
> False
|
|
|
|
567) T/F: A view cannot provide restricted access to a relational database so it cannot be used for security purposes
|
|
> True
|
|
v False
|
|
|
|
1160) Flooding attacks take a variety of forms based on which network
|
|
protocol is being used to implement the attack.
|
|
v True
|
|
> False
|
|
|
|
589) T/F: The database management system makes use of the database description tables to manage the physical database
|
|
v True
|
|
> False
|
|
|
|
595) T/F: An IPS incorporates IDS functionality but also includes mechanisms designed to block traffic from intruders
|
|
v True
|
|
> False
|
|
|
|
340) Mobile phone worms communicate through Bluetooth wireless connections or via the _________
|
|
Select one:
|
|
> SQL
|
|
> TRW
|
|
> PWC
|
|
v MMS
|
|
|
|
367) ____________ is a form of overflow attack
|
|
> Heap overflows
|
|
> Replacement stack frame
|
|
> Return to system call
|
|
v All of the above
|
|
|
|
1102) HMAC can be proven secure provided that the embedded hash function
|
|
has some reasonable cryptographic strengths.
|
|
v True
|
|
> False
|
|
|
|
1149) A loss of _________ is the unauthorized disclosure of information.
|
|
v confidentiality
|
|
> authenticity
|
|
> integrity
|
|
> availability
|
|
|
|
149) A key exchange protocol is vulnerable to a man-in-the-middle attack if it does not authenticate the participants
|
|
v True
|
|
> False
|
|
|
|
319) The main advantage of the use of statistical profiles is that a prior knowledge of security flaws is not required
|
|
v True
|
|
> False
|
|
|
|
1100) The Diffie-Hellman algorithm depends for its effectiveness on the
|
|
difficulty of computing discrete logarithms.
|
|
v True
|
|
> False
|
|
|
|
014) An important element in many computer security services and
|
|
applications is the use of cryptographic algorithms
|
|
v True
|
|
> False
|
|
|
|
937) the domain name of the command and control server of a botnet are pre-determined for the lifetime of the botnet
|
|
> True
|
|
v False
|
|
|
|
52) The __________ is when the virus function is performed
|
|
> dormant phase
|
|
> propagation phase
|
|
> triggering phase
|
|
v execution phase
|
|
|
|
596) T/F: The CSP can provide backup at multiple locations, with reliable failover and disaster recovery facilities
|
|
v True
|
|
> False
|
|
|
|
131) In Kerberos, the authentication server shares a unique secret key with each authorized computer on the network
|
|
v True
|
|
> False
|
|
|
|
1171) In a biometric scheme some physical characteristic of the individual is
|
|
mapped into a digital representation.
|
|
v True
|
|
> False
|
|
|
|
418) A stack buffer overflow is also referred to as ___________
|
|
> data leakage
|
|
v stack smashing
|
|
> heap hijacking
|
|
> code injection
|
|
|
|
87) The __________ mode operates on full blocks of plaintext and ciphertext, as opposed to an s-bit subset
|
|
> ECB
|
|
> CFB
|
|
> CBC
|
|
v OFB
|
|
|
|
214) XSS is possible when a web site does not check user input properly and use the input in an outgoing html page
|
|
v True
|
|
> False
|
|
|
|
1075) the Rijndael developers designed the expansion key algorithm to
|
|
be resistant to known cryptanalytic attacks.
|
|
v True
|
|
> False
|
|
|
|
898) It is possible to write a compiler tool to check any C program and identify all possible buffer overflow bugs
|
|
> True
|
|
v False
|
|
|
|
838) Availability assures that systems works promptly and service is not
|
|
denied to authorized users
|
|
True or False
|
|
v True
|
|
> False
|
|
|
|
207) The App Store review process can guarantee that no malicious iOS app is allowed into the store for download
|
|
> True
|
|
v False
|
|
|
|
1142) A major weakness of the public announcement of public keys is
|
|
that anyone can forge a public announcement.
|
|
v True
|
|
> False
|
|
|
|
137) Issued as RFC 2104, _______ has been chosen as the mandatory-to-implement MAC for IP Security
|
|
> SHA-256
|
|
v HMAC
|
|
> MD5
|
|
> AES
|
|
|
|
1084) Restoring the plaintext from the ciphertext is __________ .
|
|
v deciphering
|
|
> transposition
|
|
> steganography
|
|
> encryption
|
|
|
|
74) OFB mode requires an initialization vector that must be unique to each execution of the encryption operation
|
|
v True
|
|
> False
|
|
|
|
05) Triple DES takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits
|
|
> True
|
|
v False
|
|
|
|
590) T/F: The cloud carrier is useful when cloud services are too complex for a cloud consumer to easily manage
|
|
> True
|
|
v False
|
|
|
|
08) A message authentication code is a small block of data generated by a
|
|
secret key and appended to a message
|
|
v True
|
|
> False
|
|
|
|
49) The term "computer virus" is attributed to __________
|
|
> Herman Hollerith
|
|
v Fred Cohen
|
|
> Charles Babbage
|
|
> Albert Einstein
|
|
|
|
167) Two of the most important applications of public-key encryption are digital signatures and key management
|
|
v True
|
|
> False
|
|
|
|
842) Security mechanisms typically do not involve more than one particular
|
|
algorithm or protocol
|
|
True or False
|
|
> True
|
|
v False
|
|
|
|
227) The IT security management process ends with the implementation of controls and the training of personnel
|
|
> True
|
|
v False
|
|
|
|
913) each layer of code needs appropriate hardening measures in place to provide appropriate security services
|
|
v True
|
|
> False
|
|
|
|
1117) The Biba models deals with confidentiality and is concerned with
|
|
unauthorized disclosure of information.
|
|
> True
|
|
v False
|
|
|
|
215) XSS can perform many types of malicious actions because a malicious script is executed at user?s browser
|
|
v True
|
|
> False
|
|
|
|
163) An inline sensor monitors a copy of network traffic; the actual traffic does not pass through the device
|
|
> True
|
|
v False
|
|
|
|
1114) It is possible to convert any block cipher into a stream cipher by using
|
|
the cipher feedback (CF> mode.
|
|
v True
|
|
> False
|
|
|
|
37) Many forms of infection can be blocked by denying normal users the right to modify programs on the system
|
|
v True
|
|
> False
|
|
|
|
28) __________ refers to setting a maximum number with respect to roles
|
|
v Cardinality
|
|
> Prerequisite
|
|
> Exclusive
|
|
> Hierarchy
|
|
|
|
152) is the original message or data that is fed into the encryption process as input
|
|
> Hash
|
|
> Key
|
|
v Plaintext
|
|
> Ciphertext
|
|
|
|
1092) The approach taken by Kerberos is using authentication software tied
|
|
to a secure authentication server.
|
|
v True
|
|
> False
|
|
|
|
25) __________ is based on the roles the users assume in a system rather than the user's identity
|
|
> DAC
|
|
v RBAC
|
|
> MAC
|
|
> URAC
|
|
|
|
245) Activists are either individuals or members of an organized crime group with a goal of financial reward
|
|
> True
|
|
v False
|
|
|
|
246) Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion
|
|
v True
|
|
> False
|
|
|
|
409) A buffer can be located _________
|
|
> in the heap
|
|
> on the stack
|
|
> in the data section of the process
|
|
v All of the above
|
|
|
|
226) It is likely that an organization will not have the resources to implement all the recommended controls
|
|
v True
|
|
> False
|
|
|
|
47) __________ are used to send large volumes of unwanted e-mail
|
|
> Rootkits
|
|
v Spammer programs
|
|
> Downloaders
|
|
> Auto-rooters
|
|
|
|
263) The ________ is responsible for determining if an intrusion has occurred
|
|
v analyzer
|
|
> host
|
|
> user interface
|
|
> sensor
|
|
|
|
899) The OpenSSL heartbleed vulnerability would have been prevented if OpenSSL had been implemented in Java
|
|
v True
|
|
> False
|
|
|
|
220) Using an input filter to block certain characters is an effective way to prevent SQL injection attacks
|
|
v True
|
|
> False
|
|
|
|
103) The _______ module performs end-to-end encryption and obtains session keys on behalf of users
|
|
> PKM
|
|
> RCM
|
|
v SSM
|
|
> CCM
|
|
|
|
1130) the primary benefit of a host-based IDS is that it can detect both
|
|
external and internal intrusions.
|
|
v True
|
|
> False
|
|
|
|
93) The _________ is the encryption algorithm run in reverse
|
|
v decryption algorithm
|
|
> ciphertext
|
|
> plaintext
|
|
> secret key
|
|
|
|
840) The more critical a component or service, the higher the level of
|
|
availability required
|
|
True or False
|
|
v True
|
|
> False
|
|
|
|
1099) If a computer's temperature gets too cold the system can undergo
|
|
thermal shock when it is turned on.
|
|
v True
|
|
> False
|
|
|
|
708) A __________ is a password guessing program
|
|
> password hash
|
|
v password cracker
|
|
> password biometric
|
|
> password salt
|
|
|
|
1088) Integrity can apply to a stream of messages, a single message, or
|
|
selected fields within a message.
|
|
v True
|
|
> False
|
|
|
|
1489) __________ controls access based on comparing security labels with security clearances.
|
|
v MAC
|
|
> DAC
|
|
> RBAC
|
|
> MBAC
|
|
|
|
124) The additive constant numbers used in SHA-512 are random-looking and are hardcoded in the algorithm
|
|
v True
|
|
> False
|
|
|
|
508) A characteristic of reflection attacks is the lack of _______ traffic
|
|
v backscatter
|
|
> network
|
|
> three-way
|
|
> botnet
|
|
|
|
313) Penetration identification is an approach developed to detect deviation from previous usage patterns
|
|
> True
|
|
v False
|
|
|
|
935) Botnet command and control must be centralized( i.e. all bots communicate with a central server(s))
|
|
> True
|
|
v False
|
|
|
|
880) A virus that attaches to an executable program can do anything that hte program is permitted to do
|
|
v True
|
|
> False
|
|
|
|
691) Identification is the means of establishing the validity of a claimed identity provided by a user
|
|
v True
|
|
> False
|
|
|
|
198) In IPSec, if A uses DES for traffic from A to B, then B must also use DES for traffic from B to A
|
|
> True
|
|
v False
|
|
|
|
34) A virus that attaches to an executable program can do anything that the program is permitted to do
|
|
v True
|
|
> False
|
|
|
|
779) The most significant source of risk in wireless networks in the underlying communications medium
|
|
v True
|
|
> False
|
|
|
|
36) A logic bomb is the event or condition that determines when the payload is activated or delivered
|
|
v True
|
|
> False
|
|
|
|
53) During the __________ the virus is idle
|
|
v dormant phase
|
|
> propagation phase
|
|
> triggering phase
|
|
> execution phase
|
|
|
|
503) TCP uses the _______ to establish a connection
|
|
> zombie
|
|
> SYN cookie
|
|
> directed broadcast
|
|
v three-way handshake
|
|
|
|
97) For stream-oriented transmission over noisy channel you would typically use _______ mode
|
|
> ECB
|
|
> CTR
|
|
v OFB
|
|
> CBC
|
|
|
|
866) One way to secure against Trojan horse attacks is the use of a secure, trusted operating system
|
|
v True
|
|
> False
|
|
|
|
593) T/F: An IDS is a set of automated tools designed to detect unauthorized access to a host system
|
|
v True
|
|
> False
|
|
|
|
350) The challenge in coping with DDoS attacks is the sheer number of ways in which they can operate
|
|
v True
|
|
> False
|
|
|
|
66) Given the potential vulnerability of DES to a brute-force attack, an alternative has been found
|
|
v True
|
|
> False
|
|
|
|
758) A packet filtering firewall is typically configured to filter packets going in both directions
|
|
v True
|
|
> False
|
|
|
|
1085) the process of converting from plaintext to ciphertext is known as
|
|
deciphering or decryption.
|
|
> True
|
|
v False
|
|
|
|
99) For general-purpose stream-oriented transmission you would typically use _______ mode
|
|
> CTR
|
|
v CFB
|
|
> ECB
|
|
> CBC
|
|
|
|
10) The default set of rights should always follow the rule of least privilege or read-only access
|
|
v True
|
|
> False
|
|
|
|
03) __________ is the scrambled message produced as output
|
|
> Plaintext
|
|
v Ciphertext
|
|
> Secret key
|
|
> Cryptanalysis
|
|
|
|
42) Packet sniffers are mostly used to retrieve sensitive information like usernames and passwords
|
|
v True
|
|
> False
|
|
|
|
236) The primary purpose of an IDS is to detect intrusions, log suspicious events, and send alerts
|
|
v True
|
|
> False
|
|
|
|
696) User authentication is the basis for most types of access control and for user accountability
|
|
v True
|
|
> False
|
|
|
|
59) The ideal solution to the threat of malware is __________
|
|
> identification
|
|
> removal
|
|
> detection
|
|
v prevention
|
|
|
|
98) For general-purpose block-oriented transmission you would typically use _______ mode
|
|
v CBC
|
|
> CTR
|
|
> CFB
|
|
> OFB
|
|
|
|
695) A good technique for choosing a password is to use the first letter of each word of a phrase
|
|
v True
|
|
> False
|
|
|
|
128) It is a good idea to use sequentially increasing numbers as challenges in security protocols
|
|
> True
|
|
v False
|
|
|
|
210) In Android, an app will never be able to get more permission than what the user has approved
|
|
v True
|
|
> False
|
|
|
|
893) Security mechanisms typically do not involve more than one particular algorithm or protocol
|
|
> True
|
|
v False
|
|
|
|
1127) Big-endian format is the most significant byte of a word in the
|
|
low-address byte position.
|
|
v True
|
|
> False
|
|
|
|
341) Backdoors become threats when unscrupulous programmers use them to gain unauthorized access
|
|
v True
|
|
> False
|
|
|
|
894) The first step in devising security services and mechanisms is to develop a security policy
|
|
v True
|
|
> False
|
|
|
|
67) A number of Internet based applications have adopted two-key 3DES, including PGP and S/MIME
|
|
> True
|
|
v False
|
|
|
|
386) Buffer overflow exploits are no longer a major source of concern to security practitioners
|
|
> True
|
|
v False
|
|
|
|
936) Both static and dynamic analyses are needed in order to fully understand malware behaviors
|
|
v True
|
|
> False
|
|
|
|
151) In general, public key based encryption is much slower than symmetric key based encryption
|
|
v True
|
|
> False
|
|
|
|
011) Transmitted data stored locally are referred to as __________
|
|
> ciphertext
|
|
> DES
|
|
v data at rest
|
|
> ECC
|
|
|
|
727) Hardware is the most vulnerable to attack and the least susceptible to automated controls
|
|
v True
|
|
> False
|
|
|
|
1109) The foundation of a security auditing facility is the initial capture of
|
|
the audit data.
|
|
v True
|
|
> False
|
|
|
|
597) T/F: Encryption is a pervasive service that can be provided for data at rest in the cloud
|
|
v True
|
|
> False
|
|
|
|
699) Enrollment creates an association between a user and the user's biometric characteristics
|
|
v True
|
|
> False
|
|
|
|
222) Organizational security objectives identify what IT security outcomes should be achieved
|
|
v True
|
|
> False
|
|
|
|
221) SQL injection is yet another example that illustrates the importance of input validation
|
|
v True
|
|
> False
|
|
|
|
203) Compared with WEP, WPA2 has more flexible authentication and stronger encryption schemes
|
|
v True
|
|
> False
|
|
|
|
165) Network-based intrusion detection makes use of signature detection and anomaly detection
|
|
v True
|
|
> False
|
|
|
|
125) The strong collision resistance property subsumes the weak collision resistance property
|
|
v True
|
|
> False
|
|
|
|
13) Traditional RBAC systems define the access rights of individual users and groups of users
|
|
> True
|
|
v False
|
|
|
|
218) It is easy for the legitimate site to know if a request is really from the (human) user
|
|
> True
|
|
v False
|
|
|
|
200) Most browsers come equipped with SSL and most Web servers have implemented the protocol
|
|
v True
|
|
> False
|
|
|
|
690) User authentication is the fundamental building block and the primary line of defense
|
|
v True
|
|
> False
|
|
|
|
6) Security labels indicate which system entities are eligible to access certain resources
|
|
> True
|
|
v False
|
|
|
|
1096) A malicious driver can potentially bypass many security controls to
|
|
install malware.
|
|
v True
|
|
> False
|
|
|
|
639) In a relational database rows are referred to as _________
|
|
> relations
|
|
> attributes
|
|
> views
|
|
v tuples
|
|
|
|
312) Password crackers rely on the fact that some people choose easily guessable passwords
|
|
v True
|
|
> False
|
|
|
|
1161) An important aspect of a distributed firewall configuration is security
|
|
monitoring.
|
|
v True
|
|
> False
|
|
|
|
1133) An important characteristic of the MAC algorithm is that it needs
|
|
to be reversible.
|
|
> True
|
|
v False
|
|
|
|
1086) A loss of integrity is the unauthorized modification or destruction
|
|
of information.
|
|
v True
|
|
> False
|
|
|
|
3) An auditing function monitors and keeps a record of user accesses to system resources
|
|
v True
|
|
> False
|
|
|
|
224) Legal and regulatory constraints may require specific approaches to risk assessment
|
|
v True
|
|
> False
|
|
|
|
568) T/F: Two disadvantages to database encryption are key management and inflexibility
|
|
v True
|
|
> False
|
|
|
|
1146) SSO enables a user to access all network resources after a single
|
|
authentication.
|
|
v True
|
|
> False
|
|
|
|
333) Viruses, logic bombs, and backdoors are examples of independent malicious software
|
|
> True
|
|
v False
|
|
|
|
225) One asset may have multiple threats and a single threat may target multiple assets
|
|
v True
|
|
> False
|
|
|
|
371) A stack overflow can result in some form of a denial of service attack on a system
|
|
v True
|
|
> False
|
|
|
|
14) A constraint is a defined relationship among roles or a condition related to roles
|
|
v True
|
|
> False
|
|
|
|
1167) The __________ is what the virus "does".
|
|
> infection mechanism
|
|
> trigger
|
|
> logic bomb
|
|
v payload
|
|
|
|
56) Unsolicited bulk e-mail is referred to as __________
|
|
v spam
|
|
> propagating
|
|
> phishing
|
|
> crimeware
|
|
|
|
575) The two commands that SQL provides for managing access rights are ALLOW and DENY
|
|
> True
|
|
v False
|
|
|
|
71) Cipher Block Chaining is a simple way to satisfy the security deficiencies of ECB
|
|
v True
|
|
> False
|
|
|
|
197) In IPSec, packets can be protected using ESP or AH but not both at the same time
|
|
> True
|
|
v False
|
|
|
|
1110) Although important,security auditing is not a key element in computer
|
|
security.
|
|
> True
|
|
v False
|
|
|
|
933) A bot is a computer compromised by malware and under the control of a bot master
|
|
v True
|
|
> False
|
|
|
|
379) A buffer overflow error is not likely to lead to eventual program termination.
|
|
> True
|
|
v False
|
|
|
|
700) An individual's signature is not unique enough to use in biometric applications
|
|
> True
|
|
v False
|
|
|
|
505) _______ is a text-based protocol with a syntax similar to that of HTTP
|
|
> RIP
|
|
> DIP
|
|
v SIP
|
|
> HIP
|
|
|
|
431) Data is simply an array of _________
|
|
> characters
|
|
> integers
|
|
> floating-point numbers
|
|
v bytes
|
|
|
|
915) The default configuration for many operating systems usually maximizes security
|
|
> True
|
|
v False
|
|
|
|
141) Symmetric encryption is also referred to as secret-key or single-key encryption
|
|
v True
|
|
> False
|
|
|
|
1081) The buffer overflow type of attack is one of the least commonly seen
|
|
attacks.
|
|
> True
|
|
v False
|
|
|
|
23) A(n) __________ is a resource to which access is controlled
|
|
v object
|
|
> owner
|
|
> world
|
|
> subject
|
|
|
|
159) _________ was the first published public-key algorithm
|
|
> ElGamal
|
|
> DSA
|
|
v Diffie-Hellman
|
|
> RSA
|
|
|
|
1132) A __________ is an algorithm that requires the use of a secret key.
|
|
> DAA
|
|
> SHA
|
|
> GCM
|
|
v MAC
|
|
|
|
914) it is possible for a system to be compromised during the installation process
|
|
v True
|
|
> False
|
|
|
|
1136) the digital signature function does not include the authentication
|
|
function.
|
|
> True
|
|
v False
|
|
|
|
19) __________ is the traditional method of implementing access control
|
|
> MAC
|
|
> RBAC
|
|
v DAC
|
|
> MBAC
|
|
|
|
1157) T F 4.The value of a primary key must be unique for each tuple of its table.
|
|
v True
|
|
> False
|
|
|
|
31) Malicious software aims to trick users into revealing sensitive personal data
|
|
v True
|
|
> False
|
|
|
|
1147) The authentication function determines who is trusted for a given purpose.
|
|
> True
|
|
v False
|
|
|
|
73) Cipher Feedback Mode conforms to the typical construction of a stream cipher
|
|
> True
|
|
v False
|
|
|
|
168) The secret key is one of the inputs to a symmetric-key encryption algorithm
|
|
v True
|
|
> False
|
|
|
|
1080) Buffer overflow attacks result from careless programming in
|
|
applications.
|
|
v True
|
|
> False
|
|
|
|
70) Cipher Feedback (CFB is used for the secure transmission of single values)
|
|
> True
|
|
v False
|
|
|
|
586) T/F: The value of a primary key must be unique for each tuple of its table
|
|
v True
|
|
> False
|
|
|
|
1103) Much of the theory of public-key cryptosystems is based on
|
|
number theory.
|
|
v True
|
|
> False
|
|
|
|
22) A __________ is an entity capable of accessing objects
|
|
> group
|
|
> object
|
|
v subject
|
|
> owner
|
|
|
|
334) In addition to propagation a worm usually performs some unwanted function
|
|
v True
|
|
> False
|
|
|
|
388) The buffer overflow type of attack is one of the most common attacks seen
|
|
v True
|
|
> False
|
|
|
|
104) Public-key encryption was developed in the late ________
|
|
> 1950s
|
|
v 1970s
|
|
> 1960s
|
|
> 1980s
|
|
|
|
164) A common location for a NIDS sensor is just inside the external firewall
|
|
v True
|
|
> False
|
|
|
|
1165) Those who hack into computers do so for the thrill of it or for status.
|
|
v True
|
|
> False
|
|
|
|
9) An access right describes the way in which a subject may access an object
|
|
v True
|
|
> False
|
|
|
|
4) External devices such as firewalls cannot provide access control services
|
|
> True
|
|
v False
|
|
|
|
1094) The authentication server shares a unique secret key with each server.
|
|
v True
|
|
> False
|
|
|
|
233) The IDS component responsible for collecting data is the user interface
|
|
> True
|
|
v False
|
|
|
|
130) In security protocol, an obvious security risk is that of impersonation
|
|
v True
|
|
> False
|
|
|
|
50) Computer viruses first appeared in the early __________
|
|
> 1960s
|
|
> 1970s
|
|
v 1980s
|
|
> 1990s
|
|
|
|
24) The final permission bit is the _________ bit
|
|
> superuser
|
|
> kernel
|
|
> set user
|
|
v sticky
|
|
|
|
1079) the XtS-AES mode is based on the concept of a tweakable block
|
|
cipher.
|
|
v True
|
|
> False
|
|
|
|
591) T/F: Fixed server roles operate at the level of an individual database
|
|
> True
|
|
v False
|
|
|
|
1154) Public-key algorithms are based on simple operations on bit patterns.
|
|
> True
|
|
v False
|
|
|
|
40) In addition to propagating, a worm usually carries some form of payload
|
|
v True
|
|
> False
|
|
|
|
1144) For end-to-end encryption over a network, manual delivery is
|
|
awkward.
|
|
v True
|
|
> False
|
|
|
|
1093) X.509 provides a format for use in revoking a key before it expires.
|
|
v True
|
|
> False
|
|
|
|
387) Shellcode must be able to run no matter where in memory it is located
|
|
v True
|
|
> False
|
|
|
|
563) T/F: Encryption becomes the last line of defense in database security
|
|
v True
|
|
> False
|
|
|
|
324) One important element of intrusion prevention is password management
|
|
v True
|
|
> False
|
|
|
|
1164) Snort can perform intrusion prevention but not intrusion detection.
|
|
> True
|
|
v False
|
|
|
|
68) The sender is the only one who needs to know an initialization vector
|
|
> True
|
|
v False
|
|
|
|
693) Many users choose a password that is too short or too easy to guess
|
|
v True
|
|
> False
|
|
|
|
374) Stack buffer overflow attacks were first seen in the Aleph One Worm
|
|
> True
|
|
v False
|
|
|
|
199) In IPSec, the sequence number is used for preventing replay attacks
|
|
v True
|
|
> False
|
|
|
|
372) There are several generic restrictions on the content of shellcode
|
|
v True
|
|
> False
|
|
|
|
583) T/F: A query language provides a uniform interface to the database
|
|
v True
|
|
> False
|
|
|
|
166) Symmetric encryption is used primarily to provide confidentiality
|
|
v True
|
|
> False
|
|
|
|
900) ASLR(if implemented correctly) can prevent return-to-libc attacks
|
|
v True
|
|
> False
|
|
|
|
399) Shellcode is not specific to a particular processor architecture
|
|
> True
|
|
v False
|
|
|
|
1143) Manual delivery of a key is not reasonable for link encryption.
|
|
> True
|
|
v False
|
|
|
|
839) The "A" in the CIA triad stands for "authenticity"
|
|
True or False
|
|
> True
|
|
v False
|
|
|
|
389) Buffer overflow attacks are one of the most common attacks seen
|
|
v True
|
|
> False
|
|
|
|
206) In iOS, an app can run its own dynamic, run-time generated code
|
|
> True
|
|
v False
|
|
|
|
336) Macro viruses infect documents, not executable portions of code
|
|
v True
|
|
> False
|
|
|
|
732) Like the MAC, a hash function also takes a secret key as input
|
|
> True
|
|
v False
|
|
|
|
235) Intruders typically use steps from a common attack methodology
|
|
v True
|
|
> False
|
|
|
|
587) T/F: A foreign key value can appear multiple times in a table
|
|
v True
|
|
> False
|
|
|
|
209) In Android, all apps have to be reviewed and signed by Google
|
|
> True
|
|
v False
|
|
|
|
121) SHA is perhaps the most widely used family of hash functions
|
|
v True
|
|
> False
|
|
|
|
735) The advantage of a stream cipher is that you can reuse keys
|
|
> True
|
|
v False
|
|
|
|
015) Some form of protocol is needed for public-key distribution
|
|
v True
|
|
> False
|
|
|
|
584) T/F: A single countermeasure is sufficient for SQLi attacks
|
|
> True
|
|
v False
|
|
|
|
205) In iOS, each file is encrypted using a unique, per-file key
|
|
> True
|
|
v False
|
|
|
|
213) Malicious JavaScripts is a major threat to browser security
|
|
v True
|
|
> False
|
|
|
|
142) The ciphertext-only attack is the easiest to defend against
|
|
v True
|
|
> False
|
|
|
|
318) Insider attacks are among the easiest to detect and prevent
|
|
> True
|
|
v False
|
|
|
|
244) An intruder can also be referred to as a hacker or cracker
|
|
v True
|
|
> False
|
|
|
|
1139) the main elements of a RFID system are tags and readers.
|
|
v True
|
|
> False
|
|
|
|
219) SQL injection attacks only lead to information disclosure
|
|
> True
|
|
v False
|
|
|
|
879) External attacks are the only threats to dataase security
|
|
> True
|
|
v False
|
|
|
|
938) Some APT attacks last for years before they are detected
|
|
v True
|
|
> False
|
|
|
|
1) Access control is the central element of computer security
|
|
v True
|
|
> False
|
|
|
|
65) S-AES is the most widely used multiple encryption scheme
|
|
> True
|
|
v False
|
|
|
|
631) A data center generally includes backup power supplies
|
|
v True
|
|
> False
|
|
|
|
1168) Programmers use backdoors to debug and test programs.
|
|
v True
|
|
> False
|
|
|
|
864) ?No write down? is also referred to as the *-property
|
|
v True
|
|
> False
|
|
|
|
1141) the Iot depends heavily on deeply embedded systems.
|
|
v True
|
|
> False
|
|
|
|
135) Kerberos does not support inter-realm authentication
|
|
> True
|
|
v False
|
|
|
|
1151) The "A" in the CIA triad stands for "authenticity".
|
|
> True
|
|
v False
|
|
|
|
136) SHA-1 produces a hash value of _______ bits
|
|
> 256
|
|
> 512
|
|
v 160
|
|
> 128
|
|
|
|
39) E-mail is a common method for spreading macro viruses
|
|
v True
|
|
> False
|
|
|
|
35) It is not possible to spread a virus via a USB stick
|
|
> True
|
|
v False
|
|
|
|
1097) Lower layer security does not impact upper layers.
|
|
> True
|
|
v False
|
|
|
|
62) There are no practical cryptanalytic attacks on 3DES
|
|
v True
|
|
> False
|
|
|
|
32) Keyware captures keystrokes on a compromised system
|
|
> True
|
|
v False
|
|
|
|
04) The secret key is input to the encryption algorithm
|
|
v True
|
|
> False
|
|
|
|
253) Anomaly detection is effective against misfeasors
|
|
> True
|
|
v False
|
|
|
|
883) A macro virus infects executable protions of code
|
|
> True
|
|
v False
|
|
|
|
38) A macro virus infects executable portions of code
|
|
> True
|
|
v False
|
|
|
|
1098) The direct flame is the only threat from fire.
|
|
> True
|
|
v False
|
|
|
|
702) A smart card contains an entire microprocessor
|
|
v True
|
|
> False
|
|
|
|
346) Malware is another name for Malicious Software
|
|
v True
|
|
> False
|
|
|
|
641) A _________ is a virtual table
|
|
> tuple
|
|
> query
|
|
v view
|
|
> DBMS
|
|
|
|
7) Reliable input is an access control requirement
|
|
v True
|
|
> False
|
|
|
|
835) Threats are attacks carried out
|
|
True or False
|
|
> True
|
|
v False
|
|
|
|
201) Even web searches have (often) been in HTTPS
|
|
v True
|
|
> False
|
|
|
|
134) The ticket-granting ticket is never expired
|
|
> True
|
|
v False
|
|
|
|
146) Timing attacks are only applicable to RSA
|
|
> True
|
|
v False
|
|
|
|
1076) InvSubBytes is the inverse of ShiftRows.
|
|
> True
|
|
v False
|
|
|
|
208) In iOS, each app runs in its own sandbox
|
|
v True
|
|
> False
|
|
|
|
1153) Public-key cryptography is asymmetric.
|
|
v True
|
|
> False
|
|
|
|
327) Bot programs are activated by a trigger
|
|
v True
|
|
> False
|
|
|
|
1148) A user may belong to multiple groups.
|
|
v True
|
|
> False
|
|
|
|
122) SHA-1 is considered to be very secure
|
|
> True
|
|
v False
|
|
|
|
703) Keylogging is a form of host attack
|
|
> True
|
|
v False
|
|
|
|
697) Memory cards store and process data
|
|
> True
|
|
v False
|
|
|
|
44) Every bot has a distinct IP address
|
|
v True
|
|
> False
|
|
|
|
1150) Threats are attacks carried out.
|
|
> True
|
|
v False
|
|
|
|
144) AES uses a Feistel structure
|
|
> True
|
|
v False
|
|
|
|
787) Search engines support HTTPS
|
|
> True
|
|
v False
|
|
|
|
204) iOS has no vulnerability
|
|
> True
|
|
v False
|