Quiz Questions Flashcards
- Denial-of-Service attacks can only happen at the network layer.
False
2.For DDoS traceback (Savage et al. ’00) a path can be reconstructed even if just one packet through the path is obtained.
False
- Denial-of-Service attacks always involve sending a very large amount of traffic.
False
- For DoS mitigation, a SYN Cookie ensures that a client is honest because it must ACK the SYN-ACK cookie from the server, and cannot reuse an old one.
True
- DoS attacks always use spoofed IP addresses.
False
- Everyone who frequents underground forums is cybercriminal or intends to be one.
False
- A lot of cybercrime contents on the web remain invisible to even a very powerful search engine like Google.
True
- If a botnet uses randomly generated domains each day for command-and-control (C&C), then there is no way to detect and block the C&C domains.
False
- Cyber frauds and scams such as on-line “pharmacy” can only fool the victims once - that is, no users will be their repeat “customers”.
False
- If I click on a phishing link and end up on a site, but I don’t provide valuable information such as my credit card number to the site, nothing bad can happen.
False
Penetration testing is limited to only the technological security controls.
False
A benefit of thorough penetration testing is the accurate accounting of network infrastructures and applications.
True
A penetration test is always launched from outside the enterprise network being tested.
False
Fake news can be considered as a social engineering attack.
True
A penetration test can combine physical as well as cyber/network access to the organization being tested.
True
The ads on a web page can be used to carry out malicious functions.
True
Browser extensions and plugins available in an official store (e.g., the Chrome Web Store) can always be trusted for not containing malicious logics.
False
The Same Origin Policy (SOP) for DOM and the SOP for cookies have different definitions of “origin”.
True
A content security policy (CSP) specifies the allowable sources of web page contents. This is essentially a whitelist approach.
True
HTTPS cookies are always secure and can be trusted
False
When you connect to Gmail, the SSL/TLS handshake takes place after you have successfully logged in
False
To securely log out a user, it is sufficient to delete the SessionToken on the client browser
False
Suppose Georgia Tech owns both the www.gatech.edu and www.gatech.edu.uk domains, it must use two different certificates.
False