WEEK 6 2025 Flashcards

(10 cards)

1
Q

Modification threat on cloud security is an example of

A

Deception
Disruption
Usurpation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of Passive attack

A

Traffic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(T/F) Interception is an attack on integrity

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

S1: Intrusion Detection System(IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
S2: Authentication is the identification of legitimate users

A

Both are True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Injection Attack
  2. Flooding
  3. Metadata(WSDL) Spoofing attack
A

Introduce malicious code to change the course of execution.
Attacker sending huge amounts of requests to a certain service and causing denial of service.
Malicious reengineering of Web Services’ metadata description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(T/F)Recovery Time Objective(RTO) represents the period of time allowed for the complete execution of the task.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Correct statements for necessary and sufficient conditions for the detection of inheritance conflict are:

A

Sufficient condition: current entry role is senior to at least one exit role.
Necessary condition: at least one exit role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hypervisor risks associated with VM escape

A

Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
Improper configuration of VM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(T/F) In fault tolerance, replication is the duplication of critical components of a system with the intention of increasing reliability of the system, usually in the case of a backup or fail-safe.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Open Source tools used for retrieving web pages in Amazon E2C platform

A

wget

How well did you know this?
1
Not at all
2
3
4
5
Perfectly