Exam I Flashcards
(136 cards)
What is required of an attack to be regarded as a cyber attack?
- The target is not a private person using a single computer.
- The attack happens on behalf of a nation state.
- The target suffers a substantial loss.
- The attacker is not acting alone but in a large coherent group.
- The target is not a private person using a single computer.
Denial of service is a term
- for a specific attack where the attacker modifies the responses from a www server to display HTTP 404.
- used of any situations where the user or a process is not granted the service he, she or it would be authorized to get.
- that refers to a service not being able to operate because of malicious requests.
- used mainly of such situations where a cracked service has been taken down for repair by administrators.
- that refers to a service not being able to operate because of malicious requests.
• What makes a denial of service attack (DoS) a distributed DoS?
- There are many hackers working in consort to gain access to the attacked service.
- The attacked server spreads the unavailability to a large community of other servers and services.
- The whole farm of load-balancing and resilience-providing computers are attacked to make the service unavailable.
- The attacking traffic comes to the server from several computers simultaneously.
- The attacking traffic comes to the server from several computers simultaneously.
• The term attack vector
- is just a more fancy way of referring to a particular attack that has happened.
- refers to the attacker’s point of view to the chain of protections that implement the defence-in-depth approach.
- refers to the method of an attack - one that happened or is possible.
- refers to the combination of all vulnerabilities that exist in a particular information system.
- refers to the method of an attack - one that happened or is possible.
• Confidentiality is one of the three basic goals (“C-I-A”) of information security,
- but it is hardly ever as important as integrity.
- and it is nearly always more important than availability.
- but it is usually not sufficient without integrity and availability.
- and lack of confidentiality would lead to similar problems as lack of either integrity or availability.
- but it is usually not sufficient without integrity and availability.
• The term script kiddie is used for certain types of attackers. What is typical of them from a defender’s perspective?
- Essentially similar scripts to several other attackers.
- Unpredictably modified scripts, which can therefore be particularly dangerous.
- They cannot be held liable because they are minors.
- Youth and incompetence, which is why their attacks are not very dangerous.
- Essentially similar scripts to several other attackers.
• Attackers that are called script kiddies are characterized by
- using scripts written by others.
- acting as apprentices and assistants to more experienced actors.
- underage and immature morality.
- installing malicious software on the machines of several other users from which the attack continues automatically.
- using scripts written by others.
• Identity theft
- happens when someone maliciously uses identifying data of another person.
- means that an attacker changes someones credentials at a service so that the victim is blocked out.
- is never a theft of identity alone; it also involves causing some loss or other disadvantage to the owner.
- can happen accidentally, i.e. someone can end up stealing someone else’s identity without intending to do so.
- happens when someone maliciously uses identifying data of another person.
• There are many digital entities that spread mainly by the forwarding action of people. Some of them are not direct risks to computing. How many of that kind of user-spread entities are in this list: spam, hoax, ransomware, meme virus, Nigerian letter, troll?
- 4
- 3
- 2
- 1
- 2
• All of the following attacks have some social aspect, but which description gives the best coverage for the concept of social engineering?
- Soliciting sensitive personal or organizational information by persuasive or masquerading emails.
- Inferring sensitive personal or organizational information from discarded papers and media together with public sources.
- Getting physically close and even familiar to people in order to see what they input as credentials to information systems.
- Exercising the art of influencing people to act against their security policy.
- Exercising the art of influencing people to act against their security policy.
• Successful impersonation means that
- an identity has been confiscated.
- a new identity has been assigned to a user.
- a new role has been assigned to a user.
- somebody/something has been cheated to act as if he/it is in contact with someone else than the attacker.
- somebody/something has been cheated to act as if he/it is in contact with someone else than the attacker.
• Malware that does not replicate, pretends to be performing a legitimate action, but does something else in the background is called
- a logic bomb.
- a trapdoor.
- a virus or a worm.
- a Trojan horse.
- a Trojan horse.
• What is a common feature of all malicious programs?
- They are capable of similar actions as other programs in their running environment.
- They are aimed at achieving some financial goal.
- They spread through vulnerabilities in software.
- They are aimed at one target, although they usually spread elsewhere.
- They are capable of similar actions as other programs in their running environment.
• A macro virus is malware that
- has a very large spread.
- runs its code from a large set of non-contiguous memory locations.
- spreads by masquerading itself as backward compatibility test code for software updates.
- runs on many different platforms (OS’s) because it is interpreted by its host program.
- runs on many different platforms (OS’s) because it is interpreted by its host program.
• There are many terms that mean some sort of showing or coming out of a covering. The term that is used to mean such kind of a vulnerability in an information system is
- revelation.
- unveiling.
- exposure.
- disclosure.
- exposure.
• What is the term used for an attack or error that causes data to be written in memory locations that are outside the allowed area?
- Stack bloat.
- Division by near-zero.
- Buffer overflow
- Flooding.
- Buffer overflow
• The term zero-day applies for instance to
- DRM protection that is broken and published before the media, e.g. a game, is launched.
- the beginning of the “life” of an identity thief under the new identity.
- a vulnerability in software not yet exploited but found and kept secret by a malicious party.
- an attack where a user of a limited-time-free trial version of software can keep his computer on the same day for an unlimited length of time.
- a vulnerability in software not yet exploited but found and kept secret by a malicious party.
• Which of the following fits most poorly to the concept of a bot network?
- Users of machines on the bot network have agreed to work with the network administrator.
- The machines on the bot network have a remote access program.
- Bot network machines are rarely owned by the same organization.
- A bot network can be used to implement a denial of service attack.
- Users of machines on the bot network have agreed to work with the network administrator.
• Man in the middle is an attack type where
- a process captures system calls, modifies them, sends them to the OS kernel, and likewise filters the responses to the calling procedure.
- the attacker or his process relays modified messages between two unknowing communication parties.
- a cryptographic algorithm is broken at about a square root of effort by working both from the start and end toward the middle.
- a process listens to a program’s system calls and their responses, and sends the divulged sensitive data to the attacker.
- the attacker or his process relays modified messages between two unknowing communication parties.
• A botnet is
- a network used solely for internal communications.
- a group of dispersed, compromised machines controlled remotely for illicit purposes.
- a complete network built for the same purpose as single “honeypot” computers.
- a tool for automating security alerts in a corporate network.
- a group of dispersed, compromised machines controlled remotely for illicit purposes.
• Information assurance is sometimes considered a wider term than information security. On the other hand, assurance is just part of information security, namely
- a synonym for authentication.
- a synonym for accountability.
- evidence that security mechanisms are efficient.
- the level up to which risk management has been able to transfer information security risks.
- evidence that security mechanisms are efficient.
• Authentication is the
- assertion of a unique identity.
- process of defining the resources and type of access a user needs.
- decision by management that a user should be given access to a system.
- process of verifying an identity.
- process of verifying an identity.
• The objective of Availability is to make information accessible by protecting it from some but not all of these: (i) denial of service, (ii) fire, (iii) flood, (iv) unauthorized transaction, (v) unreadable backup tape. How many of these are excluded?
- 4
- 1
- 2
- 3
- 1
• Which of the following couplings best defines risk?
- Threat & vulnerability
- Threat & breach of security
- Vulnerability & attack
- Vulnerability & lack of protection
- Threat & vulnerability