Ch 21 Flashcards

1
Q
  1. What is the most commonly used technique to protect against virus attacks?

A. Signature detection
B. Heuristic detection
C. Data integrity assurance
D. Automated reconstruction

A

Answer: A

Signature detection mechanisms use known descriptions of viruses to identify malicious code resident on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. You are the security administrator for an e-commerce company and are placing a new web server into production. What network zone should you use?

A. Internet
B. DMZ
C. Intranet
D. Sandbox

A

Answer: B

The DMZ (demilitarized zone) is designed to house systems like web servers that must be accessible from both the internal and external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which one of the following types of attacks relies on the difference between the timing of two events?

A. Smurf
B. TOCTTOU
C. Land
D. Fraggle

A

Answer: B

The time-of-check-to-time-of-use (TOCTTOU) attack relies on the timing of the execution of two events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following techniques requires that administrators identify appropriate applications for an environment?

A. Sandboxing
B. Control signing
C. Integrity monitoring
D. Whitelisting

A

Answer: D

Application whitelisting requires that administrators specify approved applications, and then the operating system uses this list to allow only known good applications to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What advanced virus technique modifies the malicious code of a virus on each system it infects?

A. Polymorphism
B. Stealth
C. Encryption
D. Multipartitism

A

Answer: A

In an attempt to avoid detection by signature-based antivirus software packages, polymorphic viruses modify their own code each time they infect a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which one of the following tools provides a solution to the problem of users forgetting complex passwords?

A. LastPass
B. Crack
C. Shadow password files
D. Tripwire

A

Answer: A

LastPass is a tool that allows users to create unique, strong passwords for each service they use without the burden of memorizing them all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What type of application vulnerability most directly allows an attacker to modify the contents of a system’s memory?

A. Rootkit
B. Back door
C. TOC/TOU
D. Buffer overflow

A

Answer: D

Buffer overflow attacks allow an attacker to modify the contents of a system’s memory by writing beyond the space allocated for a variable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which one of the following passwords is least likely to be compromised during a dictionary attack?

A. mike
B. elppa
C. dayorange
D. fsas3a1G

A

Answer: D

Except option D, the choices are forms of common words that might be found during a dictionary attack. mike is a name and would be easily detected. elppa is simply apple spelled backward, and dayorange combines two dictionary words. Crack and other utilities can easily see through these “sneaky” techniques. Option D is simply a random string of characters that a dictionary attack would not uncover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What file is instrumental in preventing dictionary attacks against Unix systems?

A. /etc/passwd
B. /etc/shadow
C. /etc/security
D. /etc/pwlog

A

Answer: B

Shadow password files move encrypted password information from the publicly readable /etc/passwd file to the protected /etc/shadow file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What character should always be treated carefully when encountered as user input on a web form?

A. !
B. &
C. *
D. ‘

A

Answer: D

The single quote character (‘) is used in SQL queries and must be handled carefully on web forms to protect against SQL injection attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What database technology, if implemented for web forms, can limit the potential for SQL injection attacks?

A. Triggers
B. Stored procedures
C. Column encryption
D. Concurrency control

A

Answer: B

Developers of web applications should leverage database stored procedures to limit the application’s ability to execute arbitrary code. With stored procedures, the SQL statement resides on the database server and may only be modified by database administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What type of reconnaissance attack provides attackers with useful information about the services running on a system?

A. Session hijacking
B. Port scan
C. Dumpster diving
D. IP sweep

A

Answer: B

Port scans reveal the ports associated with services running on a machine and available to the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What condition is necessary on a web page for it to be used in a cross-site scripting attack?

A. Reflected input
B. Database-driven content
C. NET technology
D. CGI scripts

A

Answer: A

Cross-site scripting attacks are successful only against web applications that include reflected input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What type of virus utilizes more than one propagation technique to maximize the number of penetrated systems?

A. Stealth virus
B. Companion virus
C. Polymorphic virus
D. Multipartite virus

A

Answer: D

Multipartite viruses use two or more propagation techniques (for example, file infection and boot sector infection) to maximize their reach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. What is the most effective defense against cross-site scripting attacks?

A. Limiting account privileges
B. Input validation
C. User authentication
D. Encryption

A

Answer: B

Input validation prevents cross-site scripting attacks by limiting user input to a predefined range. This prevents the attacker from including the HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What worm was the first to cause major physical damage to a facility?

A. Stuxnet
B. Code Red
C. Melissa
D. rtm

A

Answer: A

Stuxnet was a highly sophisticated worm designed to destroy nuclear enrichment centrifuges attached to Siemens controllers.

17
Q
  1. Ben’s system was infected by malicious code that modified the operating system to allow the malicious code author to gain access to his files. What type of exploit did this attacker engage in?

A. Escalation of privilege
B. Back door
C. Rootkit
D. Buffer overflow

A

Answer: B

Back doors are undocumented command sequences that allow individuals with knowledge of the back door to bypass normal access restrictions.

18
Q
  1. What technology does the Java language use to minimize the threat posed by applets?

A. Confidentiality
B. Encryption
C. Stealth
D. Sandbox

A

Answer: D

The Java sandbox isolates applets and allows them to run within a protected environment, limiting the effect they may have on the rest of the system.

19
Q
  1. What HTML tag is often used as part of a cross-site scripting (XSS) attack?

A. <h1>
B.
C.
D.

</h1>

A

Answer: D

The tag is used to indicate the beginning of an executable client-side script and is used in reflected input to create a cross-site scripting attack.

20
Q
  1. When designing firewall rules to prevent IP spoofing, which of the following principles should you follow?

A. Packets with internal source IP addresses don’t enter the network from the outside.
B. Packets with internal source IP addresses don’t exit the network from the inside.
C. Packets with public IP addresses don’t pass through the router in either direction.
D. Packets with external source IP addresses don’t enter the network from the outside.

A

Answer: A

Packets with internal source IP addresses should not be allowed to enter the network from the outside because they are likely spoofed.