Chapter 21 - Quiz Flashcards Preview

Intro to Computer Security Final > Chapter 21 - Quiz > Flashcards

Flashcards in Chapter 21 - Quiz Deck (10):

What is the most commonly used technique to protect against virus attacks?
A. Signature detection
B. Heuristic detection
C. Data integrity assurance
D. Automated reconstruction

A. Signature detection


Which one of the following types of attacks relies on the difference between the timing of two events?
A. Smurf
C. Land
D. Fraggle

B. TOCTTOU (Time of connection to time of use)


What advanced virus technique modifies the malicious code of a virus on each system it infects?
A. Polymorphism
B. Stealth
C. Encryption
D. Multipartition

A. Polymorphism


Which one of the following tools provides a solution to the problem of users forgetting complex passwords?
A. LastPass
B. Crack
C. Shadow password files
D. Teipwire

A. LastPass


What database technology, if implemented for web forms, can limit the potential for SQL injection attacks?
A. Triggers
B. Stored procedures
C. Column encryption
D. Concurrency control

B. Stored procedures


What type of reconnaissance attack provides attackers with useful information about the services running on a system?
A. Session hijacking
B. Port scan
C. Dumpster diving
D. IP sweep

B. Port scan


What is the most effective defense against cross-site scripting attacks?
A. Limiting account privileges
B. Input validation
C. User authentication
D. Encryption

B. Input validation


What worm was the first to cause major physical damage to a facility?
A. Stuxnet
B. Code Red
C. Melissa
D. rtm

A. Stuxnet


Ben's system was infected by malicious code that modified the operating system to allow the malicious code author to gain access to his files. What type of exploit did this attacker engage in?
A. Escalation of privilege
B. Back door
C. Rootkit
D. Buffer overflow

B. Back door


When designing firewalls rules to prevent IP spoofing, which of the following principles should you follow?
A. Packets with internal source IP addresses don't enter the network from the outside.
B. Packets with internal source IP addresses don't exit the network from the inside.
C. Packets with public IP addresses don't pass through the router in either direction.
D. Packets with external source IP addresses don't enter the network from the outside.

A. Packets with internal source IP addresses don't enter the network from the outside.