Chapter 21 - Quiz Flashcards

1
Q
What is the most commonly used technique to protect against virus attacks?
A. Signature detection
B. Heuristic detection
C. Data integrity assurance
D. Automated reconstruction
A

A. Signature detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which one of the following types of attacks relies on the difference between the timing of two events?
A. Smurf
B. TOCTTOU
C. Land
D.  Fraggle
A

B. TOCTTOU (Time of connection to time of use)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
What advanced virus technique modifies the malicious code of a virus on each system it infects?
A. Polymorphism
B. Stealth
C. Encryption
D. Multipartition
A

A. Polymorphism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which one of the following tools provides a solution to the problem of users forgetting complex passwords?
A. LastPass
B. Crack
C. Shadow password files
D. Teipwire
A

A. LastPass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
What database technology, if implemented for web forms, can limit the potential for SQL injection attacks?
A. Triggers
B. Stored procedures
C. Column encryption
D. Concurrency control
A

B. Stored procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What type of reconnaissance attack provides attackers with useful information about the services running on a system?
A. Session hijacking
B. Port scan
C. Dumpster diving
D. IP sweep
A

B. Port scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
What is the most effective defense against cross-site scripting attacks?
A. Limiting account privileges
B. Input validation
C. User authentication
D. Encryption
A

B. Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
What worm was the first to cause major physical damage to a facility?
A. Stuxnet
B. Code Red
C. Melissa
D. rtm
A

A. Stuxnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Ben's system was infected by malicious code that modified the operating system to allow the malicious code author to gain access to his files. What type of exploit did this attacker engage in?
A. Escalation of privilege
B. Back door
C. Rootkit
D. Buffer overflow
A

B. Back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When designing firewalls rules to prevent IP spoofing, which of the following principles should you follow?
A. Packets with internal source IP addresses don’t enter the network from the outside.
B. Packets with internal source IP addresses don’t exit the network from the inside.
C. Packets with public IP addresses don’t pass through the router in either direction.
D. Packets with external source IP addresses don’t enter the network from the outside.

A

A. Packets with internal source IP addresses don’t enter the network from the outside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly