Exam II Flashcards
(294 cards)
Denial of service becomes more possible
- if the service is distributed to many sites that must occasionally synchronize their data.
- if the service can be accessed through several addresses, some of which can be administratively blocked in case of too many requests.
- if the security policy dictates that too many failed attempts to log in lead to a temporary lock-out.
- if the authentication of clients requires a proof-of-effort from them.
- if the security policy dictates that too many failed attempts to log in lead to a temporary lock-out.
Three of these five: Ping of Death, Ping sweep, Smurf, Spyware and SYN flood, are examples of attacks directly against confidentiality. integrity. authentication. availability.
availability.
What is an example of a cyber attack?
An insider in a technology firm doing industrial espionage for a foreign company.
A group of script kiddies trying their skills randomly and managing to launch a distributed DoS attack against a government agency.
Using social engineering to inject code to a city’s central water supply system and causing it to crash.
Terrorists causing severe damage to the infrastructure by explosives.
Using social engineering to inject code to a city’s central water supply system and causing it to crash.
A web cookie is a piece of information stored at the
web server and concerning the browser program.
web server and concerning the browsing person.
browser and concerning the browsing person.
browser and concerning the visits to the server.
browser and concerning the visits to the server.
There are three models of cloud services, SaaS, IaaS and PaaS, that is, ‘S’, ‘I’ and ‘P’ as a service, where
S=software, I=infrastructure, P=platform
S=security, I=integrity, P=process
S=safety, I=internet, P=premises
S=software, I=infrastructure, P=procedure
S=software, I=infrastructure, P=platform
Data mining is the opposite of data hiding. an attack against privacy. a method to handle big data. a method of cryptanalysis.
a method to handle big data.
Advanced persistent threat refers to
a vulnerability that has not been patched.
a threat actor with plentiful resources who has gained unauthorized access to an information system and stays undetected for an extended period of time.
a Trojan horse that applies some novel method to compromise the system where it is residing.
a zero-day vulnerability, which the finder has sold to some party other than the manufacturer or vendor who is responsible for patching it.
a threat actor with plentiful resources who has gained unauthorized access to an information system and stays undetected for an extended period of time.
When an attacker combines the methods of aggregation and inference against a large collection of data, what is he is most likely attempting to do?
Extracting sensitive information from non-sensitive data items in databases.
Abusing social media.
A known-plaintext attack against encryption.
Password cracking.
Extracting sensitive information from non-sensitive data items in databases.
What is the term used for attacks where each successful transaction benefits the attacker only very little but the number of transactions is high? email spam phishing salami attack DDoS
salami attack
In the physical information security the concept of baiting means
blackmailing with something questionable that the victim has done.
stealing a device and requesting ransom for it.
letting the victim find a curiosity-arousing media container.
causing damage to rotating memory disks by perturbing their speed.
letting the victim find a curiosity-arousing media container.
Alice cannot figure out how her colleague Bob gained unauthorized access to her information system, because Bob has little computer experience. However among the following she can easily rule out all except a covert channel. social engineering. a dictionary attack. shoulder surfing.
shoulder surfing.
An internet troll is a type of
fake news that is spreading unusually fast.
anonymous communication protocol.
author of disturbing messages.
hacker who is trying to find and sell vulnerabilites to anyone who wants to pay.
author of disturbing messages.
The concept deepfake is related to steganography. side channels in multimedia. forged video. anonymous commerce on counterfeit products.
forged video.
Which attack is based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs)? Timing information, power consumption, electromagnetic leaks or even sound can provide a means for this. a side-channel attack implicit attack direct-access attack brute-force attack
a side-channel attack
Meet-in-the-middle is an attack type where
password hashes are broken by optimizing the use of rainbow tables.
a cryptographic algorithm is broken at about a square root of effort by working both from the start and end toward the middle.
the attacker or his process relays modified messages between two unknowing communication parties.
the statistics of the birthday paradox are simultaneously applied to identity theft of many individuals.
a cryptographic algorithm is broken at about a square root of effort by working both from the start and end toward the middle.
A birthday attack is a way to
make inferences on private personal data from social media posts.
“paradoxically” find a hash collision much faster than an input that gives a particular hash.
boost social engineering, by knowing not only the birthday of the victim but also an approaching birthday of a colleague of the victim.
crack an average person’s passwords faster in case his or her birthday is known.
“paradoxically” find a hash collision much faster than an input that gives a particular hash.
Rooting
is an attack type where an outside intruder gets administrative rights to an operating system.
is a term referring to methods of overriding the limitations of the OS for installing programs from any sources.
involves alteration of OS access controls on a computer in such a way that all users have administrative rights.
means that an attacker has been able to alter the initial operations that a computer does before the OS starts.
is a term referring to methods of overriding the limitations of the OS for installing programs from any sources.
A root kit is
a term referring to methods of breaking the limitations of the OS for installing programs from various sources.
is a set of tools for breaking the DRM limitations of multimedia software with respect to viewing, copying and modifying content.
a collection of software tools which - after getting to a computer - allow the attacker to access the machine with root privileges.
the common name for versions of a computer virus that attaches to one of the supervisor or kernel modules.
a collection of software tools which - after getting to a computer - allow the attacker to access the machine with root privileges.
Which two of these statements are true? (i) Only about one-fifth of computer viruses come from optical disks, memory sticks, and other storage media (ii) Files with .bat and .pif as name extensions can contain malware. (iii) Antivirus software vendors update virus identification databases usually a few times an hour. (iv) A memory-based virus scan program is constantly running and scans the programs before they start.
(ii) & (iv)
(i) & (iv)
(ii) & (iii)
(i) & (iii)
(ii) & (iv)
Which two of these claims are true? (i) More than a quarter of computer viruses come from optical disks, memory sticks, and other removable media. (ii) Files with .scr and .pif as name extensions can contain malware. (iii) Antivirus software vendors usually have to update virus identification data twice a week. (iv) Heuristic-based antivirus software does not need to be updated as often as software that is based on traditional scanning.
(ii) & (iii)
(ii) & (iv)
(i) & (iii)
(i) & (iv)
(ii) & (iv)
None of the following is a definition of a buffer overflow, but which one best describes it?
The program counter, i.e. the address of the next instruction to be executed, is moved forward by one, even if it is already in the last instruction of the subroutine.
It is always a security threat because an attacker can use it to cause evil - at least a program crash.
A memory reference made by a program points to another process’s memory area.
A number larger than the array size is used to index the array, and the operating system does not block this reference.
A number larger than the array size is used to index the array, and the operating system does not block this reference.
Only depending on their context, a sequence of bits in the memory of a computer can mean either data or instructions. This can lead to attacks of type impersonation. injection. buffering. bit rot.
injection.
A covert channel
is a way of communicating that is hidden from the access control mechanisms.
was originally meant for transmitting inaudible signals between computer peripherals but was deprecated since attackers found a way to abuse it.
refers to a data transfer mechanism that an attacker has enabled between computer processes even if it should have been disabled according to the security policy.
is a performance-optimizing design that allows data flow through a common kernel process serving different users.
is a way of communicating that is hidden from the access control mechanisms.
Assume that two processes compete for a shared resource. If they cooperate in such a way that the system's security policy is violated, the situation is called a race condition. object reuse. a covert channel. denial of service.
a covert channel.