Midterm 1 Flashcards
External attacks are the only threats to database security. (T/F)
False
A virus that attaches to an executable program can do anything that the program is permitted to do. (T/F)
True
It is not possible to spread a virus via a USB stick. (T/F)
Fase
Many forms of infection can be blocked by denying normal users the right to modify programs on the system. (T/F)
True
A macro virus infects executes portions of code. (T/F)
False
In addition to propagating, a worn usually carries some form of payload. (T/F)
True
______is the process of performing authorized queries and reducing unauthorized information from the legitimate responses received.
A. Perturbation
B. Inference
C. Compromise
D. Partitioning
B. Inference.
_____ is a defence against SQL injections attacks.
A. Perturbation
B. Input validation
C. Anonymization
D. Partitioning
B. Input Validation
To defend against database inference attacks, we can apply ________
A. Perturbation
B. De-identification
C. Anonymization
D. All the above
D. All the above
_______ are used to send large volumes of unwanted email.
A. Rootkits
B. Spammer programs
C. Downloaders
D. Auto-rooter
B. Spammer programs
A ______ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.
A. logic bomb
B. trapdoor
C. worm
D. Trojan horse
A. logic bomb
The ____ is what the virus does?
A. infection mechanism
B. trigger
C. logic bomb
D. payload
D. payload
_____ is the first function in the propagation phase for a network worm.
A. Propagating
B. Fingerprinting
C. Keylogging
D. Spear phishing
B. Fingerprint
_____ is malware that encrypts the user’s data and demands payment in order to access the key needed to recover the information.
is malware that encrypts the user?s data and demands payment in order to access the key needed to recover the information.
A. Trojan horse
B. Ransomware
C. Crimeware
D. Polymorphic
B. Ransomware
Each layer of code needs appropriate hardening measures in place to provide appropriate security services. (T/F)
True
It is possible for system to be compromised during the install process. (T/F)
True
The default configuration for many operating systems usually maximizes security. (T/F)
False
A malicious driver can potentially bypass many security controls to install malware. (T/F)
True
Performing regular backups of data on a system is critical control that assists with maintaining the integrity of the system and user data. (T/F)
True
Many users choose password that is too short or too easy to guess because it is hard for users to remember long random passwords. (T/F)
True
In a biometric scheme some physical characteristic of the individual is mapped into a digital representation. (T/F)
True
Users authentication is a procedure that allows communicating parties to verify that the contents of received message have not been altered and that the source is authentic. (T/F)
False
Which of the following need to be taken into consideration during the system security planning process?
A.) how users are authenticated
B.) the categories of users of the system
C.) what access the system has to information stored on other hosts
D.) All the above
D. all the above
The following steps should be used to secure an operating system:
A.) test the security of the basic operating system
B.) remove unnecessary services
C.) install and patch the operating system
D.) all of the above
D. all the above
_____ applications is a control that limits the programs that can execute on the system to just those in an explicit list.
White listing
The most important changes needed to improve system security are to _______
A.) disable remotely accessible services that are not required
B.) ensure that applications and services that are needed are appropriately configured
C.) disable services and applications that are not required
D.) all of the above
D. all of the above
Security concerns that result from the use of virtualized systems include ______.
A. guest OS isolation
B. guest OS monitoring by the hypervisor
C. virtualized environment security
D. all of the above
D. all of the above
Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the _______.
A. identification step
B. authentication step
C. verification step
D. corroboration step
C. Verification step
Recognition by fingerprint, retina, and face are examples of _______.
A. face recognition
B. static biometrics
C. dynamic biometrics
D. token authentication
B. static biometrics