Quiz 1 Material Flashcards
Security mechanisms typically do not involve more than one particular algorithm or protocol? T/F
False
The first step in devising security services and mechanisms is to develop a security policy. T/F
True
To exploit any type of buffer overflow the attacker needs to identify a buffer overflow vulnerability in some program that can be triggered using externally sourced data under the attacker’s control. T/F
True
Shellcode is not specific to a particular processor architecture T/F
False
An attacker can generally determine in advance exactly where the target buffer will be located in the stack frame of the function in which it is defined. T/F
False
It is possible to write a compiler tool to check any C program and identify all possible buffer overflow bugs. T/F
False
The OpenSSL heartbleed vulnerability would have been prevented if OpenSSL had been implemented in Java (and the Java runtime env works properly). T/F
True
ASLR (if implemented correctly) can prevent return-to-libc attacks. T/F
True
____ Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
Privacy
_____ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
System Integrity
A loss of _____ is the unauthorized disclosure of information.
Confidentiality
A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) _____.
Vulnerability
An assault on system security that derives from an intelligent act that is a deliberate attack to evade security services and violate the security policy of a system is a(n) ____.
attack
A(n) ____ is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause , or by discovering and reporting it so that correct action can be taken.
Countermeasure
An example of ___ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
Masquerade