Infosec Flashcards
A bot is a computer compromised by malware and under the control of a bot master (attacker). (T or F)
True
The best defense against being an unwitting participant in a DDoS attack is to prevent your systems from being compromised. TF
True
Botnet command-and-control must be centralized, i.e., all bots communicate with a central server(s). TF
False
Both static and dynamic analyses are needed in order to fully understand malware behaviors. TF
False
The domain name(s) of the command and control server(s) of a botnet are pre-determined for the lifetime of the botnet. TF
False
Some APT attacks last for years before they are detected. TF
True
If we find that a botnet server is located in country X, we can be certain that criminals within country X control the botnet.
False
A firewall can serve as the platform for IPSec.
True
A packet filtering firewall is typically configured to filter packets going in both directions.
True
A prime disadvantage of an application-level gateway is the additional processing overhead on each connection.
True
A DMZ is one of the internal firewalls protecting the bulk of the enterprise network.
False
A Botnet can use \_\_\_\_\_\_\_ for command-and-control. A.Email B.HTTP C.IRC D.All the above
D.All the above
In a \_\_\_\_\_\_ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system. A.SYN flood B.DNS amplification C.poison packet D.UDP flood
B.DNS amplification
Characteristics of APT include \_\_\_\_\_\_. A.Using zero-day exploit B.Low-and-slow C.Targeting high-value data D.All the above
D.All the above
The \_\_\_\_\_\_\_ defines the transport protocol. A.destination IP address B.source IP address C.interface D.IP protocol field
D.IP protocol field
A \_\_\_\_\_\_\_\_\_ gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host. A.packet filtering B.stateful inspection C.application-level D.circuit-level
D.circuit-level
Typically the systems in the \_\_\_\_\_\_\_\_ require or foster external connectivity such as a corporate Web site, an e-mail server, or a DNS server. A.DMZ B.IP protocol field C.boundary firewall D.VPN
A.DMZ
A \_\_\_\_\_\_\_ configuration involves stand-alone firewall devices plus host-based firewalls working together under a central administrative control. A.packet filtering firewall B.distributed firewall C.personal firewall D.stateful inspection firewall
B.distributed firewall
The \_\_\_\_\_\_\_\_ attack is designed to circumvent filtering rules that depend on TCP header information. A.tiny fragment B.address spoofing C.source routing D.bastion host
A.tiny fragment
The firewall may be a single computer system or a set of two or more systems that cooperate to perform the firewall function.
True
Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified.
T
To be of practical use an IDS should detect a substantial percentage of intrusions while keeping the false alarm rate at an acceptable level.
T
An inline sensor monitors a copy of network traffic; the actual traffic does not pass through the device.
F
A common location for a NIDS sensor is just inside the external firewall.
T