exam 1 review Flashcards

1
Q

Security mechanisms typically do not involve more than one particular algorithm or protocol (T/F)

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The first step in devising security services and mechanisms is to develop a security policy (T/F)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To exploit any type of buffer overflow the attacker needs to identify a buffer overflow vulnerability in some program that can be triggered using externally sourced data under the attacker’s control (T/F)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Shellcode is not specific to a particular processor architecture

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attacker can generally determine in advance exactly where the targeted buffer will be located in the stack frame of the function in which it is defined.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is possible to write a compiler tool to check any C program and identify all possible buffer overflow bugs.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The OpenSSL heartbleed vulnerability would have been prevented if OpenSSL had been implemented in Java (and the Java runtime environment works properly).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ASLR (if implemented correctly) can prevent return‐to‐libc attacks

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

A

System Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A loss of _______ is the unauthorized disclosure of information.

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A flaw or weakness in a system?s design, implementation, or operation and management that could be exploited to violate the system?s security policy is a(n) ______.

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) _____.

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A(n) ______ is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that correct action can be taken.

A

countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An example of ______ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.

A

masquerade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The assurance that data received are exactly as sent by an authorized entity is _____.

A

data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A consequence of a buffer overflow error is _____.

A

(all of the above)

  • corruption of data used by the program
  • unexpected transfer of control in the program
  • possible memory access violation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The function of ______ was to transfer control to a user command‐line interpreter, which gave access to any program available on the system with the privileges of the attacked program.

A

shellcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

______ is a form of buffer overflow attack.

A

(all of the above)

  • Heap overflows
  • Return to system call
  • Replacement stack frame
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A buffer can be located ______.

A

(all of the above)

  • in the heap
  • on the stack
  • in the data section of the process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Each layer of code needs appropriate hardening measures in place to provide appropriate security services.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

It is possible for a system to be compromised during the installation process.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The default configuration for many operating systems usually maximizes security.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A malicious driver can potentially bypass many security controls to install malware.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Performing regular backups of data on a system is a critical control that assists with maintaining the integrity of the system and user data.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Many users choose a password that is too short or too easy to guess because it is hard for users to remember long and random passwords.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In a biometric scheme some physical characteristic of the individual is mapped into a digital representation.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following need to be taken into consideration during the system security planning process?

A

(all of the above)

  • how users are authenticated
  • the categories of users of the system
  • what access the system has to information stored on other hosts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The following steps should be used to secure an operating system:

A

(all of the above)

  • test the security of the basic operating system
  • remove unnecessary services
  • install and patch the operating system
31
Q

_____ applications is a control that limits the programs that can execute on the system to just those in an explicit list.

A

White listing

32
Q

The most important changes needed to improve system security are to _____.

A

(all of the above)

  • disable remotely accessible services that are not required
  • ensure that applications and services that are needed are appropriately configured
  • disable services and applications that are not required
33
Q

Security concerns that result from the use of virtualized systems include ______.

A

(all of the above)

  • guest OS isolation
  • guest OS monitoring by the hypervisor
  • virtualized environment security
34
Q

Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the _______.

A

verification step

35
Q

Recognition by fingerprint, retina, and face are examples of _______.

A

static biometrics

36
Q

Voice pattern, handwriting characteristics, and typing rhythm are examples _______.

A

dynamic biometrics

37
Q

A _____ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

A

reactive password checking

38
Q

Each individual who is to be included in the database of authorized users must first be ______ in the system.

A

enrolled

39
Q

Which of the following is an example of multi-factor authentication:

A

(all of the above)
- Enter both a group password and a user password
- Enter a pin number and put a finger on fingerprint reader
- Use an authentication token (e.g., a smartcard)
Incorrect

40
Q

Which of the following is a threat to or concern of biometric authentication:

A

(all of the above)

  • Inherent imprecision (e.g., two people may have their fingerprints digitally interpreted as the same)
  • Impersonation (e.g., use a voice recording)
  • Coercion (e.g., force the user to put his finger on the fingerprint reader)
41
Q

The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner.

A

True

42
Q

Security labels indicate which system entities are eligible to access certain resources.

A

False

43
Q

A user may belong to multiple groups.

A

True

44
Q

An access right describes the way in which a subject may access an object.

A

True

45
Q

Any program that is owned by, and SetUID to, the superuser potentially grants unrestricted access to the system to any user executing that program.

A

True

46
Q

No write down is also referred to as the *-property.

A

True

47
Q

A subject can exercise only accesses for which it has the necessary authorization and which satisfy the MAC rules.

A

True

48
Q

One way to secure against Trojan horse attacks is the use of a secure, trusted operating system.

A

True

49
Q

Multilevel security is of interest when there is a requirement to maintain a resource in which multiple levels of data sensitivity are defined.

A

True

50
Q

The Common Criteria for Information Technology and Security Evaluation are ISO standards for specifying security requirements and defining evaluation criteria.

A

True

51
Q

_____ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A

Access control

52
Q

_____ is the granting of a right or permission to a system entity to access a system resource.

A

Authorization

53
Q

______ controls access based on comparing security labels with security clearances.

A

MAC

54
Q

A(n) ______ is a named job function within the organization that controls this computer system.

A

role

55
Q

_____ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization.

A

Constraints

56
Q

A multilevel secure system for confidentiality must enforce:

A

(all of the above)

  • no read up
  • ss-property
  • no write down
57
Q

The ______ Model was developed for commercial applications in which conflicts of interest can arise.

A

Chinese Wall

58
Q

______ data are data that may be derived from corporate data but that cannot be used to discover the corporation’s identity.

A

Sanitized

59
Q

The _____ is a hardware module that is at the heart of a hardware/software approach to trusted computing.

A

TPM

60
Q

_____ is a process that ensures a system is developed and operated as intended by the system?s security policy.

A

Assurance

61
Q

External attacks are the only threats to database security. T/F

A

False

62
Q

A virus that attaches to an executable program can do anything that the program is permitted to do. T/F

A

True

63
Q

It is not possible to spread a virus via an USB stick. T/F

A

False

64
Q

A macro virus infects executable portions of code. T/F

A

False

65
Q

In addition to propagating, a worm usually carries some form of payload.

A

True

66
Q

_______ is the process of performing authorized queries and deducing unauthorized information from the legitimate responses received.

A

Inference

67
Q

______ is a defense against SQL Injection attacks.

A

Input validation

68
Q

To defense against database inference attacks, we can apply _______.

A

(All the above)

  • Perturbation
  • De-identification
  • Anonymization
69
Q

_______ are used to send large volumes of unwanted e-mail.

A

Spammer program

70
Q

A _______ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.

A

logic bomb

71
Q

The _______ is what the virus does.

A

payload

72
Q

______ is the first function in the propagation phase for a network worm.

A

Fingerprinting

73
Q

_______ is malware that encrypts the user’s data and demands payment in order to access the key needed to recover the information.

A

Ransomware