Quiz Questions Flashcards

1
Q
  1. Denial-of-Service attacks can only happen at the network layer.
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2.For DDoS traceback (Savage et al. ’00) a path can be reconstructed even if just one packet through the path is obtained.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Denial-of-Service attacks always involve sending a very large amount of traffic.
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. For DoS mitigation, a SYN Cookie ensures that a client is honest because it must ACK the SYN-ACK cookie from the server, and cannot reuse an old one.
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. DoS attacks always use spoofed IP addresses.
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Everyone who frequents underground forums is cybercriminal or intends to be one.
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A lot of cybercrime contents on the web remain invisible to even a very powerful search engine like Google.
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. If a botnet uses randomly generated domains each day for command-and-control (C&C), then there is no way to detect and block the C&C domains.
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Cyber frauds and scams such as on-line “pharmacy” can only fool the victims once - that is, no users will be their repeat “customers”.
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. If I click on a phishing link and end up on a site, but I don’t provide valuable information such as my credit card number to the site, nothing bad can happen.
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Penetration testing is limited to only the technological security controls.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A benefit of thorough penetration testing is the accurate accounting of network infrastructures and applications.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A penetration test is always launched from outside the enterprise network being tested.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fake news can be considered as a social engineering attack.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A penetration test can combine physical as well as cyber/network access to the organization being tested.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ads on a web page can be used to carry out malicious functions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Browser extensions and plugins available in an official store (e.g., the Chrome Web Store) can always be trusted for not containing malicious logics.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The Same Origin Policy (SOP) for DOM and the SOP for cookies have different definitions of “origin”.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A content security policy (CSP) specifies the allowable sources of web page contents. This is essentially a whitelist approach.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

HTTPS cookies are always secure and can be trusted

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When you connect to Gmail, the SSL/TLS handshake takes place after you have successfully logged in

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

To securely log out a user, it is sufficient to delete the SessionToken on the client browser

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Suppose Georgia Tech owns both the www.gatech.edu and www.gatech.edu.uk domains, it must use two different certificates.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Browsers typically accept certificates from only a handful of CAs.

A

False

25
Q

The random sequence number in the SYN/ACK packet can prevent an attacker from establishing a TCP session but cannot prevent him from launching a DoS

A

True

26
Q

Using ARP spoofing an attacker can cause traffic to a gateway to instead be sent to his machine (on the same LAN).

A

True

27
Q

Incorrect BGP advertisements by a node can be detected by other nodes and therefore the incorrect advertisements will not be propagated.

A

False

28
Q

In Kaminsky’s Poisoning attack, the attacker floods the local resolver with responses that point the name server of a domain (e.g., www.gatech.edu) to his machine.

A

True

29
Q

DNSSEC relies on a public-key infrastructure (PKI).

A

True

30
Q

If a program is packed (i.e., encrypted and compressed), it must be malware.

A

False

31
Q

It is impossible to achieve absolute, complete transparency in malware analysis because, e.g., malware can use network timing to detect the analyzer (because traffic goes through the analyzer, which can cause additional delay).

A

True

32
Q

If emulator-based obfuscation is in use, the system calls produced by running the “malware” are from the emulator program and cannot be easily analyzed to reveal the original malware logic.

A

True

33
Q

If you download apps from only the official app store, your phone will be free of mobile malware.

A

False

34
Q

In malware analysis, dynamic fuzzing is useful when symbolic execution fails to yield results quickly.

A

True

35
Q

All data privacy issues in cloud computing can be solved by just encrypting data in transmission (over the Internet) and at rest (storage in the Cloud).

A

False

36
Q

A main challenge in virtual machine monitoring is the need to understand the memory layouts of data structures of the operating system and applications in the guest virtual machine.

A

True

37
Q

A drawback of virtual machine monitoring is the high time overhead.

A

True

38
Q

The use of property-preserving encryption can lead to privacy leakage (e.g., revealing a user’s gender and even identity).

A

True

39
Q

If we don’t trust the cloud provider, e.g., we believe it will observe our data access patterns to find out what we are doing, then there is nothing we can do other than not using the cloud provider.

A

False

40
Q

If a computer sends a heartbeat message to an Internet site and receives some command and data from the site every day, it must be a (malicious) bot (of a botnet).

A

False

41
Q

If a computer sends out scanning traffic, it must be a (malicious) bot (of a botnet).

A

False

42
Q

If a domain name is random looking (e.g., we can’t find any part of it in a dictionary), it must be the domain name of a botnet C&C server.

A

False

43
Q

An important benefit of directing botnet C&C traffic to a DNS sinkhole is the capturing of bot IP addresses.

A

True

44
Q

BotMiner can detect botnets that use centralized C&C servers as well as botnets that use P2P for C&C.

A

True

45
Q

When scanning the IPv4 space using a tool such as Zmap, every scan (with the same parameters) should return the same results.

A

False

46
Q

Zmap uses widely (and randomly) dispersed scanning targets to achieve high speed.

A

True

47
Q

The goal of a domain reputation system such as Notos is to identify newly created or previously unclassified malicious domains.

A

True

48
Q

If an IP address (i.e., an Internet host) is known to have hosted malicious domains, then the reputation of any domain that is resolved to (i.e., hosted by) this IP address is also tainted (i.e., more likely than others to be malicious).

A

True

49
Q

Before we attempt a botnet takedown, we need to first investigate its infrastructure, and so all we need to do is to run the bot malware in a sandbox environment for a few minutes and observe the domain(s) that it uses.

A

False

50
Q

The use of machine learning (ML) in security is a very recent development (i.e., only started in the last few years).

A

False

51
Q

A bot sends spam only during the day because the attacker has learned that sending spam during the night results in an anomaly by a ML-based detection system. This is called an evasion attack on machine learning.

A

True

52
Q

To make a causative (or, poisoning) attack on machine learning successful, an attacker just needs to inject random noise into the training data.

A

False

53
Q

One of the reasons why PAYL can be evaded is that it is very simple: the features are very simple and the anomaly detection model is also very simple.

A

True

54
Q

It is very hard to prevent poisoning attack when we don’t have complete control of the process of generating or collecting training data (and hence can’t ascertain the authenticity and integrity of training data).

A

True

55
Q

If we replicate our valuable data and store the copies in multiple servers, we can improve (or, at the least, not weaken) its availability, integrity, and confidentiality.

A

False

56
Q

In Secret Sharing, one can create as many shares as he desires (i.e., n can be arbitrarily large), but having too many shares increases the chance of an attacker acquiring enough (i.e., at least k) shares to obtain the original secret.

A

True

57
Q

In the Byzantine Fault-Tolerance model discussed in the lecture, it is assumed that a replica can be faulty (e.g., gives a wrong answer) or simply not responding (e.g., has crashed).

A

True

58
Q

To improve the tolerance against cyberattacks, we can use several replicated systems (with the same hardware and software) instead of just one.

A

False