Exam 1 Review Flashcards

1
Q

A data breach is one that ex-filtrates large amounts of sensitive data that was stored on some server

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Overflowing a global variable is considered a stack overflow

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A good example of a strongly typed language would be C

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In regards to overflow exploits, you only need to worry about “ints” not “strings”

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A “Canary Value” is used in the stack frame to keep track of overflow detection

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When done deliberately as part of an attack on a system, the transfer of control could be to code of the attacker’s choosing

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Buffer overflow exploits have been known since the SSL Heartbleed that occurred in 1971

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A programmer can tell the operating system to not allow programs to overflow memory

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Declaring variables as global stops all change of being able to overflow buffers

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In order to stop overflow exploits, you can use a simple data validation technique

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When using shell code or instructions that make up shell-code, who’s privileges will you be using?

A

Privileges of the host program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The buffer in an overflow exploit could be located in which of the following

A

On the Stack, On the Heap, and In the Data Section

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What moves addresses of stack, heap, and lib-c to make buffer overflow more difficult?

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Stacks are used for which of the following?

A

Allocating memory for Local Variables, Parameters, and Control Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The definition of shell code is:

A

Binary values corresponding to the desired machine instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a NOP sled?

A

A sequence of instructions that do nothing to control program flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Best way to stop buffer/heap exploits?

A

Enforce boundary checking on all inputs

wrong answers - use pointers, tell the user how much data needs to be input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A stack buffer overflow occurs when the targeted buffer is located on the stack, usually as a local variable in a function’s stack frame. This form of attack is also referred to as:

A

Stack Smashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ is when a system is performing its intended functions without being degraded or impaired by changes or disruptions in its internal or external environments?

A

System Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following are the main threat resources of cyber assets?

A

Nation-States, Cybercriminals, Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Each layer of code needs appropriate hardening measures in place to provide appropriate security services

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The default configuration for many operating systems usually maximizes security.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A very common configuration fault seen with Web and file transfer servers is for all the files supplied by the service to be owned by the same “user” account that the server executes as.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Backup and archive processes are linked and manager together

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.

A

False. (answer: message authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Depending on the details of the overall authentication system, the registration authority issues some sort of electronic credential to the subscriber.

A

False. (credential provider)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An individual’s signature is not unique enough to use in biometric applications.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In a biometric scheme some physical characteristic of the individual is mapped to a digital representation.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Keylogging is a form of host attack.

A

False. (form of eavesdropping)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The first step in deploying new systems is ____.

A

planning

31
Q

The first critical step in securing a system is to secure the ____.

A

base operating system.

32
Q

The range of logging data acquired should be determined ____.

A

during the system planning stage.

33
Q

The need and policy relating to backup and archive should be determined ____.

A

during the system planning stage.

34
Q

_____ systems should not run automatic updates because they may introduce instability.

A

Change controlled.

35
Q

Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ____.

A

verification step

36
Q

The ____ strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords.

A

user education

37
Q

Each individual who is to be included in the database of authorized users must first be ___ in the system

A

enrolled.

38
Q

A _____ is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored.

A

host attack.

39
Q

A _____ is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path.

A

client attack.

40
Q

A policy rule base or policy store may consist of a number of policy rules, covering many subjects and objects within a security domain.

A

True

41
Q

The 3 A’s of access control are Authentication, Authorization, and Allowance.

A

False. (Authentication, Authorization, and Audit.)

42
Q

The rows of an Access Control Maxis are Capability Lists.

A

True.

43
Q

An object is said to have a security clearance of a given level;

where as a subject is said to have a security classification of a given level.

A

False.

An subject is said to have a security clearance of a given level.

An object is said to have a security classification of a given level.

44
Q

Conventional Discretionary Access Control systems define access rights based on the roles that users assume in a system, rather than the user’s identity.

A

False

45
Q

Which of the following support elements is not needed for enterprise-wide access control facility.

  • Resource Management
  • Privilege Management
  • Policy Management
  • Credential Management
A

Credential Management

46
Q

In an Attribute-Based Access Control (ABAC) model, entities such as files, tables, programs, and networks are considered:

  • Subjects
  • Objects
  • Environments
A

Objects

47
Q

What classes is/are included in the traditional file access control approach?

A

Owner Class, Group Class, and Other Class.

48
Q

In the context of Role-Based Access Control Models, RBAC1 adds which of the following:

  • Role Hierarchies
  • Constraints
  • Sessions
  • Cardinality
  • Mutually Exclusive Roles
A

Role Hierarchies

49
Q

RBAC0 - Hierarchies? Contraints?
RBAC1 - Hierarchies? Contraints?
RBAC2 - Hierarchies? Contraints?
RBAC3 - Hierarchies? Contraints?

A

RBAC0 - no, no
RBAC1 - yes, no
RBAC2 - no, yes
RBAC3 - yes, yes

50
Q

Based on assurance requirements, which type of analysis would you use to identify any potential means of bypassing security policy and mitigate these possibilities?

A

Covert Channel.

51
Q

A worm is a type of malware that may appear to have a useful function, but also contains hidden malicious functions.

A

False. (Trojan horse)

52
Q

Interfaces and APIs are not a likely point of attack on Cloud Services

A

False.

53
Q

Parameterized query insertion is an effective approach to prevent SQL injection attacks.

A

True.

54
Q

It is a commonly accepted best practice to store user’s passwords in a database table, so a website’s authentication program can validate a user trying to log into the site by verifying the characters entered in the login form matches exactly the characters stored in the table’s password field for that specific user.

A

False.

55
Q

In addition to propagating, a worm usually carries some form of payload.

A

True.

56
Q

A virus classification by target includes which of the following:

  • Multipartite virus
  • Metamorphic virus
  • Polymorphic virus
  • All of the above
  • None of the above
A

Multipartite virus - infects files in multiple ways. Typically the multipartite virus is capable of infecting multiple types of files, so that virus eradication must deal with all possible sites of infection.

57
Q

____ infects a mater boot record or boot record and spreads when a system is booted from the disk containing the virus.

Virus classified by target.

A

Boot sector infector.

58
Q

_____ infects files that the operating system or shell considered to be executable.

Virus classified by target.

A

File infector.

59
Q

_____ infects files with macro or scripting code that is interpreted by an application.

Virus classified by target.

A

Macro virus.

60
Q

_____ a form of virus that uses encryption to obscure it’s contents.

Virus classified by concealment strategy.

A

Encrypted virus.

61
Q

_____ a form of virus explicitly designed to hide itself from detection by anti-virus software.

Virus classified by concealment strategy.

A

Stealth virus.

62
Q

_____ a form of virus that creates copies during replication that are functionally equivalent buy have distinctly different bit patterns.

Virus classified by concealment strategy.

A

Polymorphic virus.

63
Q

_____ rewrites itself completely after each iteration.

Virus classified by concealment strategy.

A

metamorphic virus.

64
Q

Bots can be user for which of the following:

  • Distributed denial-of-service (DDoS) attacks
  • Spamming
  • Sniffing Traffic
  • Spreading new malware
  • All of the above
  • Both A & C
  • None of the above
A

All of the above

65
Q

In information security, a “logic bomb” generally refers to ______.

A

A program embedded in the malware that lies dormant until a predefined condition is met; it triggers an unauthorized act.

66
Q

____ detection methods for SQL Injection attacks are based on verifying distinct patterns. This approach must be routinely updated and may be unsuccessful against self-modifying attacks.

A

Signature based.

67
Q

____ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious active.

A

Behavior-blocking software.

68
Q

___ email attachment that when opened will send itself to all people in the user’s book.

A

virus

69
Q

____ a login program with an undocumented option that will allow an attacker to supply any username and password to gain access to the computer.

A

trapdoor.

70
Q

____ use signatures of known viruses.

A

Simple scanners.

71
Q

____ integrity checking. Making sure the checksum is the same as before infection. This can be defeated by compressing the file to have the same size as the pre-infection file.

A

Heuristic scanners.

72
Q

_____ look for specific activities that malware performs.

A

Activity traps.

73
Q

____ state of the art anti-virus. It is host-based, network-based, and sandbox-based.

A

Full-feature analysis.