Deck 16: Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
Play
Full screen (f)
Deck 16: Security
1
To protect the systems we have to ensure security on the following level:
A) physical
B) network
C) operating system
D) all of the above
A) physical
B) network
C) operating system
D) all of the above
D
2
Describe the idea of masquerading attack.
During a masquerading, an attacker pretends to be an authorized user in order to gain access to a system or to gain greater privileges than are authorized for her/him.
3
______________ virus changes each time it is installed to avoid detection by antivirus software.
A) A polymorphic
B) A source code
C) An encrypted
D) A macro
A) A polymorphic
B) A source code
C) An encrypted
D) A macro
B
4
________________ encrypts the information on the target computer and renders it inaccessible to the owner
A) Spyware
B) Ransomware
C) Logic bomb
D) all of the above
A) Spyware
B) Ransomware
C) Logic bomb
D) all of the above
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
Using a firewall, the following connection is allowed:
A) from Internet to company's computers
B) from Internet to DMZ (demilitarized zone)
C) from computers in DMZ (demilitarized zone) to company computers
D) none of the above
A) from Internet to company's computers
B) from Internet to DMZ (demilitarized zone)
C) from computers in DMZ (demilitarized zone) to company computers
D) none of the above
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
Vulnerability scans can check:
A) unexpected long-running processes
B) hidden network daemons
C) unauthorized programs in system directories
D) all of the above
A) unexpected long-running processes
B) hidden network daemons
C) unauthorized programs in system directories
D) all of the above
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
Describe the idea of main-in-the-Medium attack.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
Describe the problem of a buffer overflow.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
IPSec uses ______ encryption.
A) asymmetric
B) symmetric
C) one-time password
D) Caesar cipher
A) asymmetric
B) symmetric
C) one-time password
D) Caesar cipher
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
Address Space Layout Randomization (ASLR) technique protects an operating system against_______________
A) a macro virus
B) zero-day attack
C) Denial of Service
D) a code-injection attack
A) a macro virus
B) zero-day attack
C) Denial of Service
D) a code-injection attack
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
Why an asymmetric encryption algorithm uses two keys?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
What is the reason to use a stream cipher?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
TLS provides security at the _______ layer.
A) network
B) transport
C) application
D) none of the above
A) network
B) transport
C) application
D) none of the above
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
Port scanning allows a hacker to__________________
A) known users' passwords
B) disrupt legitimate use of a system
C) detect a system's vulnerabilities
D) modify a transmission between a remote user and a system
A) known users' passwords
B) disrupt legitimate use of a system
C) detect a system's vulnerabilities
D) modify a transmission between a remote user and a system
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
Why UNIX does not suffer from viruses?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
IPSs (Intrusion Prevention Systems) can detect zero-day attack if they employ_____________
A) signature-based detection
B) anomaly detection
C) all of the above
D) none of the above
A) signature-based detection
B) anomaly detection
C) all of the above
D) none of the above
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
User authentication can be based on_______________
A) the user's possession of something
B) the user's knowledge of something
C) an attribute of the user
D) all of the above
A) the user's possession of something
B) the user's knowledge of something
C) an attribute of the user
D) all of the above
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
Trojan mule is a type of the Trojan horse which emulates ____________
A) a legitimate email
B) a system shell
C) a login program
D) a legitimate webpage
A) a legitimate email
B) a system shell
C) a login program
D) a legitimate webpage
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
Describe the principle of least privilege.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
________ is a type of social-engineering attack, in which a legitimate-looking e-mail misleads a user into entering confidential information.
A) spamming
B) phishing
C) attack surface
D) denial-of-service
A) spamming
B) phishing
C) attack surface
D) denial-of-service
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
The attack surface is the set of points at which an attacker can try to break into the system.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
How does one distribute a key for symmetric algorithms?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
Transport Layer Security (TLS) employs server's certificate from certification authority (CA).
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
It is much faster for a computer to encode and decode ciphertext by using the usual symmetric algorithms than by using asymmetric algorithms.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
A virus is a fragment of code embedded in a malware.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
In a symmetric encryption algorithm, one key is used to encrypt and a different one is used to decrypt.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
When a user logs on, MW Windows 10 creates a list of files which can be used by the user.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
What does a security policy include?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
The purpose of denial-of-service attacks is to gain information or steal resources.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
How are one-time password systems implemented?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
MS Word documents in RTF format are resistant to macro viruses.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
32
A firewall is installed between the trusted and the untrusted.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck