Infosec Flashcards
A bot is a computer compromised by malware and under the control of a bot master (attacker). (T or F)
True
The best defense against being an unwitting participant in a DDoS attack is to prevent your systems from being compromised. TF
True
Botnet command-and-control must be centralized, i.e., all bots communicate with a central server(s). TF
False
Both static and dynamic analyses are needed in order to fully understand malware behaviors. TF
False
The domain name(s) of the command and control server(s) of a botnet are pre-determined for the lifetime of the botnet. TF
False
Some APT attacks last for years before they are detected. TF
True
If we find that a botnet server is located in country X, we can be certain that criminals within country X control the botnet.
False
A firewall can serve as the platform for IPSec.
True
A packet filtering firewall is typically configured to filter packets going in both directions.
True
A prime disadvantage of an application-level gateway is the additional processing overhead on each connection.
True
A DMZ is one of the internal firewalls protecting the bulk of the enterprise network.
False
A Botnet can use \_\_\_\_\_\_\_ for command-and-control. A.Email B.HTTP C.IRC D.All the above
D.All the above
In a \_\_\_\_\_\_ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system. A.SYN flood B.DNS amplification C.poison packet D.UDP flood
B.DNS amplification
Characteristics of APT include \_\_\_\_\_\_. A.Using zero-day exploit B.Low-and-slow C.Targeting high-value data D.All the above
D.All the above
The \_\_\_\_\_\_\_ defines the transport protocol. A.destination IP address B.source IP address C.interface D.IP protocol field
D.IP protocol field
A \_\_\_\_\_\_\_\_\_ gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host. A.packet filtering B.stateful inspection C.application-level D.circuit-level
D.circuit-level
Typically the systems in the \_\_\_\_\_\_\_\_ require or foster external connectivity such as a corporate Web site, an e-mail server, or a DNS server. A.DMZ B.IP protocol field C.boundary firewall D.VPN
A.DMZ
A \_\_\_\_\_\_\_ configuration involves stand-alone firewall devices plus host-based firewalls working together under a central administrative control. A.packet filtering firewall B.distributed firewall C.personal firewall D.stateful inspection firewall
B.distributed firewall
The \_\_\_\_\_\_\_\_ attack is designed to circumvent filtering rules that depend on TCP header information. A.tiny fragment B.address spoofing C.source routing D.bastion host
A.tiny fragment
The firewall may be a single computer system or a set of two or more systems that cooperate to perform the firewall function.
True
Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified.
T
To be of practical use an IDS should detect a substantial percentage of intrusions while keeping the false alarm rate at an acceptable level.
T
An inline sensor monitors a copy of network traffic; the actual traffic does not pass through the device.
F
A common location for a NIDS sensor is just inside the external firewall.
T
Network-based intrusion detection makes use of signature detection and anomaly detection.
T
Symmetric encryption is used primarily to provide confidentiality.
T
Two of the most important applications of public-key encryption are digital signatures and key management.
T
The secret key is one of the inputs to a symmetric-key encryption algorithm.
T
The strength of a hash function against brute-force attacks depends on the length of the hash code produced by the algorithm.
T
Public-key algorithms are based on simple operations on bit patterns.
T
A \_\_\_\_\_\_\_ monitors the characteristics of a single host and the events occurring within that host for suspicious activity. A.host-based IDS B.security intrusion C.network-based IDS D.intrusion detection
A.host-based IDS
\_\_\_\_\_\_\_ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder. A.Profile based detection B.Signature detection C.Threshold detection D.Anomaly detection
B.Signature detection
\_\_\_\_\_\_\_ involves the collection of data relating to the behavior of legitimate users over a period of time. A.Profile based detection B.Signature detection C.Threshold detection D.Anomaly detection
D.Anomaly detection
A(n) \_\_\_\_\_\_ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor. A.passive sensor B.analysis sensor C.LAN sensor D.inline sensor
D.inline sensor
The \_\_\_\_\_\_ is the IDS component that examines the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator. A.data source B.sensor C.operator D.analyzer
D.analyzer
On average, \_\_\_\_\_\_\_\_ of all possible keys must be tried in order to achieve success with a brute-force attack. A.one-fourth B.half C.two-thirds D.three-fourths
B.half
\_\_\_\_\_\_\_\_ is a procedure that allows communicating parties to verify that received or stored messages are authentic. A.Cryptanalysis B.Decryption C.Message authentication D.Collision resistance
C.Message authentication
The purpose of a \_\_\_\_\_\_\_\_ is to produce a ?fingerprint? of a file, message, or other block of data. A.secret key B.digital signature C.keystream D.hash function
D.hash function
A \_\_\_\_\_\_\_\_\_ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key. A.digital signature B.keystream C.one-way hash function D.secret key
A.digital signature
If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to \_\_\_\_\_\_\_\_ . A.use longer keys B.use shorter keys C.use more keys D.use less keys
A.use longer keys
Symmetric encryption is also referred to as secret-key or single-key encryption
T
The ciphertext-only attack is the easiest to defend against.
T
A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained.
T
AES uses a Feistel structure.
F
Each block of 64 plaintext bits is encoded independently using the same key? is a description of the CBC mode of operation.
F
Timing attacks are only applicable to RSA.
F
Using PKCS (public-key cryptography standard), when RSA encrypts the same message twice, different ciphertexts will be produced.
T
The Diffie-Hellman algorithm depends for its effectiveness on the difficulty of computing discrete logarithms
T