Day 1 39-75 Flashcards
1.39 To infect a machine, a rootkit needs which privilege level?
A. User level privileges
B. Ring 3 Privileges
C. System level privileges
D. Kernel level privileges
D
1.40 What is the name of the Steganography method that hides data in the “white-space” of files?
A. snow
B. beetle
C. magnet
D. cat
A
1.41 Besides input validation, what is another countermeasure against an XSS scripting attack such as an attacker entering the following on a web page:
<script> alert(“You big dummy!”) </script>
A. Create an IP access list and restrict connections based on port number
B. Replace “<” and “>” characters with “& l t;” and “& g t;” using server scripts
C. Disable Javascript in IE and Firefox browsers
D. Connect to the server using HTTPS protocol instead of HTTP
B
1.42 Which of these web-server maintenance steps would involve a forensic investigator?
A. Configuring, protecting, and analyzing log files
B. Backing up critical information frequently
C. Maintaining a protected authoritative copy of the organization’s Web content
D. Establishing and following procedures for recovering from compromise
E. Testing and applying patches in a timely manner
F. Testing security periodically.
D
1.43 Which of these are common web vulnerabilities that a web admin should be concerned about
A. Non-validated parameters, broken access control, broken account and session management, cross-site scripting and buffer overflows
B. Visible clear text passwords, anonymous user account set as default, missing latest security patch, no firewall filters set and no SSL configured
C. No SSL configured, anonymous user account set as default, missing latest security patch, no firewall filters set and an inattentive system administrator
D. No IDS configured, anonymous user account set as default, missing latest security patch, no firewall filters set and visible clear text passwords
A
1.44 Which of these is the most efficient way for an attacker to infect a remote corporate machine with a trojan?
A. Physical access - the attacker can simply copy a Trojan horse to a victim’s hard disk infecting the machine via Firefox add-on extensions
B. Custom packaging - the attacker can create a custom Trojan horse that mimics the appearance of a program that is unique to that particular computer
C. Custom packaging - the attacker can create a custom Trojan horse that mimics the appearance of a program used by the company
D. Downloading software from a website. An attacker can offer free software, such as shareware programs and pirated mp3 files
C
1.45 More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed by using polymorphic shellcode. This is a technique common among virus writers that basically hides the true nature of the shellcode in different disguises. How does a polymorphic shellcode work?
A. They reverse the working instructions into opposite order by masking the IDS signatures.
B. They compress shellcode into normal instructions, uncompress the shellcode using loader code, and then execute.
C. They encrypt the shellcode, use loader code to decrypt the shellcode, then executing the decrypted shellcode.
D. They convert the shellcode into Unicode using a loader to convert back to machine code before execution.
C
1.46 Your web-page asks users to enter their mailing address, but you’re worried about possible buffer overflow attacks. Which bit of pseudo-code would correctly limit the Address1 field to 40 characters and avoid a buffer overflow?
A. if (Address1 = 40) {update field} else exit
B. if (Address1 != 40) {update field} else exit
C. if (Address1 >= 40) {update field} else exit
D. if (Address1 <= 40) {update field} else exit
D
1.47 Which bit of pseudo-code in a programming module would limit input to less than 300 characters, and if there are 300 characters, the module should stop because it can’t hold any more data?
A. If (I > 300) then exit
B. If (I < 300) then exit
C. If (I <= 300) then exit
D. If (I >= 300) then exit
D
1.48 What type of attack will take advantage of a flaw in a web page to force other user’s browsers to send malicious requests they didn’t intend to send?
A. File injection attack
B. Hidden field manipulation attack
C. SQL Injection attack (SQLi)
D. Cross-Site Request Forgery (CSRF)
D
1.49 An example of a logical or technical control would be?
A. Security tokens
B. Heating and air conditioning
C. Smoke and fire alarms
D. Corporate security policy
A
1.50 Which famous trojan could command and control a botnet?
A. YouKill DOOM
B. Damen Rock
C. Poison Ivy
D. Matten Kit
C
1.51 You want to steal a file from work and send it to your home computer. If your company monitors outbound traffic, how can you transfer the file without raising any suspicion?
A. Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account
B. Package the Sales.xls using Trojan wrappers and telnet them back your home computer
C. You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques
D. Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account
C
1.52 Which ISO standard should definitely be implemented?
A. ISO/IEC 27001
B. ISO/IEC 27002
C. ISO/IEC 27003
D. ISO/IEC 27004
A
1.53 A common web site flaw allows users to provide data onto a web site, then displays that content to other users in an un-sanitized form. Which attack takes advantage of this?
A. URL Traversal attack
B. SQL Injection
C. Cross-site-scripting attack
D. Buffer Overflow attack
C