Chapter 21 - Quiz Flashcards
What is the most commonly used technique to protect against virus attacks? A. Signature detection B. Heuristic detection C. Data integrity assurance D. Automated reconstruction
A. Signature detection
Which one of the following types of attacks relies on the difference between the timing of two events? A. Smurf B. TOCTTOU C. Land D. Fraggle
B. TOCTTOU (Time of connection to time of use)
What advanced virus technique modifies the malicious code of a virus on each system it infects? A. Polymorphism B. Stealth C. Encryption D. Multipartition
A. Polymorphism
Which one of the following tools provides a solution to the problem of users forgetting complex passwords? A. LastPass B. Crack C. Shadow password files D. Teipwire
A. LastPass
What database technology, if implemented for web forms, can limit the potential for SQL injection attacks? A. Triggers B. Stored procedures C. Column encryption D. Concurrency control
B. Stored procedures
What type of reconnaissance attack provides attackers with useful information about the services running on a system? A. Session hijacking B. Port scan C. Dumpster diving D. IP sweep
B. Port scan
What is the most effective defense against cross-site scripting attacks? A. Limiting account privileges B. Input validation C. User authentication D. Encryption
B. Input validation
What worm was the first to cause major physical damage to a facility? A. Stuxnet B. Code Red C. Melissa D. rtm
A. Stuxnet
Ben's system was infected by malicious code that modified the operating system to allow the malicious code author to gain access to his files. What type of exploit did this attacker engage in? A. Escalation of privilege B. Back door C. Rootkit D. Buffer overflow
B. Back door
When designing firewalls rules to prevent IP spoofing, which of the following principles should you follow?
A. Packets with internal source IP addresses don’t enter the network from the outside.
B. Packets with internal source IP addresses don’t exit the network from the inside.
C. Packets with public IP addresses don’t pass through the router in either direction.
D. Packets with external source IP addresses don’t enter the network from the outside.
A. Packets with internal source IP addresses don’t enter the network from the outside.