L10: Big Data and Security Flashcards
A polymorphic attack can change it’s appearance with every instance.
True
A polymorphic attack has no predictable signature for the attack.
True
Each instance of polymorphic code has different, but normal, appearance.
False
What are the three components of polymorphic attacks?
Attack vector
Attack body
Polymorphic decryptor
In polymorphic attacks, the process should not result in an abnormally large attack size.
True
In polymorphic attacks, the blending needs to be economical in time and space.
True
Polymorphic attacks must collect a lot of data to learn normal statistics.
False
After blending, the polymorphic attack should match the normal profile perfectly.
False
If we can completely control the process of generating or collecting the training data and ascertain the authenticity and integrity of the dataset, we don’t have to worry about data poisoning attacks.
True
If the training data is obtained in an open environment, e.g. the web, there is always the potential of poisoning attacks.
True
In _________ learning the main task is to find patterns, structures, or knowledge in unlabeled data.
Unsupervised
In _________ learning the task is to find a function or model that explains the data.
Supervised
In _________ learning some of the data is labeled during acquisition.
Semi-Supervised