It security Flashcards
MCQ
- What is a blind SQL injection?
A A helper application for SQL injection developed for the partially sighted
B A type of attack where the result is not directly visible to attacker
C When the attacker is only capable of randomly modifying the SQL query
D When the attacker is only capable of modifying the SQL query with the help of a proxy
module
B A type of attack where the result is not directly visible to attacker
- Interdependent privacy risks for a given user emerge owing to
A Negative externalities of data sharing with third parties
B High fixed costs of ICT services
C Positive externalities of data sharing with third parties
D The data sharing decisions of the given user
A Negative externalities of data sharing with third parties
- What is Stuxnet?
A a malware
B An Iranian uranium enrichment plan
C An industrial network standard
D A network of cyber criminal organizations
A a malware
- Which of the following solutions can provide protection against ROP attacks?
A ASLR
B Harvard architecture
C DEP
D NX bit
A ASLR
- Information security is risk management. Assuming that attackers are becoming
more skilled over time and other factors affecting the risk of an attack stay the same,
A The likelihood of the attack stays the same, but the risk increases
B The likelihood of the attack increases, hence the risk decreases
C The likelihood of the attack decreases, hence the risk increases
D The likelihood of the attack increases, hence the risk increases
D The likelihood of the attack increases, hence the risk increases
- What does the design principle “complete mediation” say?
A The amount of shared mechanisms should be minimized
B So\ware should run with the least amount of privileges necessary to complete its task
C Keep it small and simple
D Check every access to every object every time access is requested
D Check every access to every object every time access is requested
- Which of the following attacks is not relevant for key exchange protocols?
A Replay of protocol messages
B Impersonating a protocol participant
C Exhaustive key search attack
D Man-in-the-middle attack
Note: There are 2 different answers in the files we have.
A Replay of protocol messages
C Exhaustive key search attack
- Which of the following risks is not relevant for IT security?
A Denial of services provided by an IT system
B Illegal access to data
C Illegal modification of data
D Random hardware failures
D Random hardware failures
- What does k-anonymity mean?
A The direct identifiers of an individual match at least k records in the anonymized dataset
B The sensitive attribute values of an individual match at least k, or 0 records in the
anonymized
dataset
C The quasi-identifiers if an individual match at least k, or 0 records in the anonymized
dataset
D The sensitive attribute values of an individual match at most k records in the anonymized
dataset
C The quasi-identifiers if an individual match at least k, or 0 records in the anonymized
dataset
- What property of JavaScript makes it dangerous?
A a user generated event is equivalent to a code-based event
B Every object inherits from a global prototype
C The language was developed in about 10 days
D Every variable is in the global scope
Note: There are 2 different answers in the files we have. From the slides I would say both
are correct.
D Every variable is in the global scope
B Every object inherits from a global prototype
- What is a shell code?
A a particular type of message integrity checksums
B The passcode needed to run the shell
C The program code of the OS shell (e. g. bash or cmD exe)
D Attacker input that aims at opening a shell
D Attacker input that aims at opening a shell
- Which of these is not among the most common attacks against browsers?
A Stack/heap overflow
B Use-after-free
C Integer overflow
D Compromising the ASLR
Note: There are 2 different answers in the files we have.
B Use-after-free
D Compromising the ASLR
- Which of the following properties characterize cyber criminal groups?
A Advanced technical skills, variable information gathering capabilities, rich resources
B Advanced technical skills, advanced information gathering capabilities, limited resources
C Variable technical skills, limited information gathering capabilities, limited resources
D Limited technical skills, limited information gathering capabilities, rich resources
A Advanced technical skills, variable information gathering capabilities, rich resources
- What is not among the security goals of Google Chrome?
A Reducing the spreading of exploits
B Reducing the frequency of exposures
C Reducing the window of vulnerabilities
D Reducing the severity of vulnerabilities
A Reducing the spreading of exploits
- Which task is to relay security-related info to the development team?
A Security contact
B Security advisor
C Security team
D Security leadership team
A Security contact
- What is a stack frame?
A Pair of memory addresses referring to the top and the bottom of the stack
B A framework for programming the stack
C Memory area referenced by the stack pointer
D Part of the stack handled by a given function when it is called
D Part of the stack handled by a given function when it is called
- What does the design principle “least common mechanism” say?
A The amount of shared mechanisms should be minimized
B Software should run with the least amount of privileges necessary to complete the task
C Check every access to every object every time access is requested
D Consider the human in the loop
A The amount of shared mechanisms should be minimized
- What does salting mean in the case of password hashing?
A Decreasing the hash computation time by optimization
B Increasing the hash computation time artificially
C Computing a hash of random length
D The hash depends on some random input, besides the password
D The hash depends on some random input, besides the password
- Android device encryption feature protects against which of the following attacks?
A Reading user data from the memory of a phone that is tuned on
B Ransomware (since everything is already encrypted )
C Reading user data from the storage of a phone that is turned on, using a data cable
disguised as a USB charging cable
D Reading user data from the flash chip of a phone that is turned off
A Reading user data from the memory of a phone that is tuned on