infosec omtentamen Flashcards

1
Q

? is the ability of a system to confirm that a sender cannot convincingly deny having sent something

A

Acountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The risk that remains uncovered by security controls is called

A

Residual risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In access control a ? could be described as a single or multi use ticket to access an objective or service

A

capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

? overflows often come from innocent programmer oversights or failures to documment and check for excessive data

A

buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

? day attack: Active malware exploiting a product vulnerability for which the manufacturer has no countermeasure available.

A

zero

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

? can be used to detect altered content on a web site or in a file.

A

integrity checksums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

complete the sentence:

(proxy,stateless, circuit, stateful) inspection firewalls judge according to information from multiple packets

A

Stateless inspection firewalls judge according to information from multiple packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

complete the sentence
The (echo-chargen. echo, teardrop. chargen, spoofing) attack involves sending IP fragments with overlapping, oversized payloads to the target machine.

A

Teardrop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

. Which of the following properties are not related to the preservation of the integrity of an object?

Capacity
accuracy
unmodified
internal consistency

A

Capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In operating systems, (hypervisors, sandboxes, firewalls, honeypots,) can be used to lure an attacker into an enviroment that can be controlled and monitored.

A

honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is essential to conceal passwords when stored on a system. One way of concealing is by using(codes, hash, pepper, salt) which is user-specific component joined with the password. Such a practise help inhibit (guessing, dumpster diving, social engineering, rainbow table) attacks

A

Salt Rainbow table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Integrity is a security aspect that sometimes is more important that confidentiality. What tools derived from cryptography can detect changes in data? 
Error correction codes
All of them
Hash codes
Error detection codes
A

All of them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pfleeger, Pfleeger and Margulies (2015) describe a number of types of malicious code. Match the type of malicious code with the corresponding description

Codew or entire computer under control of a (usually remote) program.

Code that causes malicious behavior and propagates copies of itself to other programs

Code that triggers action when a predetermined condition occurs

Dropper
Scareware
Worm
Logic bomb
Virus
zombie
trapdor
A
  1. Zombie
  2. virus
  3. Logic bomb
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unfair use of a copyrighted item is called (piracy, privacy, lending, fair use)

A

Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
What word would best describe how an intrusion detection system operates?
Proactive
Reactive
inductive
reductive
A

Reactive

Intrusion detection and prevention are two broad terms describing application security practises used to mitigate attacks and block new threats.

The first is a reactive measure that identifies and mitigates ongoing attacks using an intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
What is the benefits of using a viritual private network
Increased lag
Increased confidentiality
Increased availablity
Decreased lag
A

increased confidentiality

17
Q

Which alternative would provide the best countermeassure against an on-line attack (active authentication) against a username and a password?
The use of a long password
The use of a firewall
To use the Diffie-hellman password exchange
To use a strict limit on login failures

A

To use a strict limit on login failures

18
Q

Which of the following sentences describe the term asset best from an information security perspective?
Anything that an organization buys
Anything that is situated within an organization’s premises
anything that has a value to the organization
Anything that an organization sells

A

Anything that has a value to the organization

19
Q

If integrity is preserved we may mean that the item is :

A
  1. unmodified
  2. accurate
  3. usable
20
Q

Name three examples that could mean a failure of confidentiality

A

unauthorized person accesses data
unauthorized system or service accesses data
unauthorized person learns the existence of a piece of data

21
Q

Availability

give three examples of service/ information that shows that availability is preserved

A

It is presented in a usable form
it has enough capacity to meet the services needs
the service is completed in a acceptable period of time

22
Q

CIA triad

Explain confidentiality

A

The ability of a system to ensure than an asset is viewed only by authorized parties

23
Q

CIA TRIAD

Explain intergrity

A

the ability of a system to ensure that an asset is modified only by authorized parties

24
Q

CIA TRIAD

explain availability

A

the ability of a system to ensure that any authorized parties can use an asset

25
Q

What does Risk mean

A

the possibility for harm to occur is called risk

26
Q

what do you call the risk that remains uncovered by controlls?

A

residual risk

27
Q

What is a buffer overflow attack?

A

the most common DoS attack. The concept is to send more traffic to a network address than the programmers have built the system to handle.

28
Q

what is a ICMP flood?

A

leverages misconfigured network devices by sending spoofed packets that ping every computer on the targeted network

29
Q

what is a SYN flood?

A

Sends a request to connect to a server but never completes the handshake

30
Q

A business continuity plan documents how a buisness will continue to function during or after a computer security incident.
what are the steps that are preformed in a business continuity plan?

A

assess the business impact of a crisis
develop a stratergy to control the impact
develop and implement a plan for the strategy

31
Q

explain role based access control

A

role based access controll are based on a subjects role not their identity. subjects rights can change depending on their current role

32
Q

explain, what is:
a virus
a trojan horse
a worm

A

a virus is a code that causes malicous behavior and propagates copies of itself to other programs

a trojan horse is code that contains unexpected, undocumented, additional functionality

a worm is a code that propagates copies of itself through a network: impact is usually degraded preformance

33
Q

Explain what is:
A rabbit
a logic bomb
a time bomb

A

rabbit is a code that replicates itself without limit to exhaust recources
a logic bomb is code that triggers action when predetermined conditions occurs
a time bomb is code that triggers action when a predetermined time occurs

34
Q

what is:
a dropper
spyware
bot

A

Dropper is tranfer agent code only to drop other malicous code, such as virus or trojan horse

spyware, program that intercepts and covertly communicates data on the user or the users activity

bot, semi-autonomous agent, under control of a usually remote controller or herder, not necessarily malicious

35
Q

what is:
A zombie
a browser hijacker
rootkit

A

a zombie is code or entire computer under control of usually remote program
browser hijacker is code that changes broswer settings disalows access to certain sites, or redirects browser to others
rootkit is code installed in root or most privileged section of operating system, hard to detect

36
Q

what is:
trapdoor or backdoor
tool or toolkit
scareware

A

Code feature that allows unnauthorized access to a machine or program bypasses normal access control and authentication
tool or toolkit is program containing a set of test for vulnerabilities not dangerous itself but each successful test identifies a vulnerable host that can be attacked

scareware. not code, false warning of malicous code attack