infosec omtentamen Flashcards
? is the ability of a system to confirm that a sender cannot convincingly deny having sent something
Acountability
The risk that remains uncovered by security controls is called
Residual risk
In access control a ? could be described as a single or multi use ticket to access an objective or service
capability
? overflows often come from innocent programmer oversights or failures to documment and check for excessive data
buffer
? day attack: Active malware exploiting a product vulnerability for which the manufacturer has no countermeasure available.
zero
? can be used to detect altered content on a web site or in a file.
integrity checksums
complete the sentence:
(proxy,stateless, circuit, stateful) inspection firewalls judge according to information from multiple packets
Stateless inspection firewalls judge according to information from multiple packets
complete the sentence
The (echo-chargen. echo, teardrop. chargen, spoofing) attack involves sending IP fragments with overlapping, oversized payloads to the target machine.
Teardrop
. Which of the following properties are not related to the preservation of the integrity of an object?
Capacity
accuracy
unmodified
internal consistency
Capacity
In operating systems, (hypervisors, sandboxes, firewalls, honeypots,) can be used to lure an attacker into an enviroment that can be controlled and monitored.
honeypots
It is essential to conceal passwords when stored on a system. One way of concealing is by using(codes, hash, pepper, salt) which is user-specific component joined with the password. Such a practise help inhibit (guessing, dumpster diving, social engineering, rainbow table) attacks
Salt Rainbow table
Integrity is a security aspect that sometimes is more important that confidentiality. What tools derived from cryptography can detect changes in data? Error correction codes All of them Hash codes Error detection codes
All of them
Pfleeger, Pfleeger and Margulies (2015) describe a number of types of malicious code. Match the type of malicious code with the corresponding description
Codew or entire computer under control of a (usually remote) program.
Code that causes malicious behavior and propagates copies of itself to other programs
Code that triggers action when a predetermined condition occurs
Dropper Scareware Worm Logic bomb Virus zombie trapdor
- Zombie
- virus
- Logic bomb
Unfair use of a copyrighted item is called (piracy, privacy, lending, fair use)
Piracy
What word would best describe how an intrusion detection system operates? Proactive Reactive inductive reductive
Reactive
Intrusion detection and prevention are two broad terms describing application security practises used to mitigate attacks and block new threats.
The first is a reactive measure that identifies and mitigates ongoing attacks using an intrusion detection system