Tentafrågor Flashcards
Encryption is one way to protect confidentiality.
True
The main security properties (CIA) are confidentiality, integrity, and authenticity.
False
Eavesdropping is an attack on integrity.
False
Authentication has two parts, identification (who is the subject, e.g., user id) and verification
(making sure they really are who they claim to be).
True
Authentication always requires proving that you know a secret, e.g., a password.
False
The reason for individual salts for hashing passwords is to compensate for different lengths of passwords, which would otherwise make them easier to guess.
False
With symmetric encryption, the sender and receiver use the exact same secret key.
True
For digital envelopes to work, the sender and receiver first need to agree on a shared key.
False
If Alice sends a message to Bob using public-key cryptography, Bob needs to have both his own private key and Alice’s public key to decrypt the message and be sure that it is from Alice.
True
Strong collision resistance means that a secure hash function withstands brute force attacks
to find a collision with a given hash value even from attackers with high computational power.
False
If the interpreter or JIT is correct, the usage of memory safe languages (like Java) prevents buffer overflows.
True
Functions check stack canaries (to be unmodified) just before they return.
True
Stack canaries can be used to detect all possible buffer overflows.
False
The main propagation strategy of a worm consists of exploiting vulnerabilities of remote
programs.
True
The main propagation strategy of a virus consists of exploiting vulnerabilities of remote programs.
False
An antivirus using generic description emulates the CPU, executes the virus in the interpreter, and waits that the virus decrypts itself to identify the malicious payload.
True
Flooding (non-distributed) attacks like ICMP flood require that the attacker has more band- width than the victim.
True
A successful DOS is a loss of confidentiality.
False
In a TCP/IP SYN spoof attack the attacker attempts to fill the TCP connection table of the
victim.
True
Guard pages are regions of virtual memory whose execution is forbidden, but writable accesses are permitted.
False
Address space randomization counters buffer overflows because it prevents an attacker from knowing the size of the buffers.
False
In case of executable address space protection, the heap is configured as writable and non- executable.
True
In multi-level security, users (subjects) have clearance levels and resources (objects) have classification levels. What a user with a specific clearance can do to a resource with a specific classification depends on the security model.
True
Discretionary access control means that it’s up to owner of a resource (e.g., a file) to decide whether an access request is checked.
False