WEEK 6 2025 Flashcards
(10 cards)
Modification threat on cloud security is an example of
Deception
Disruption
Usurpation
Examples of Passive attack
Traffic analysis
(T/F) Interception is an attack on integrity
False
S1: Intrusion Detection System(IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
S2: Authentication is the identification of legitimate users
Both are True
- Injection Attack
- Flooding
- Metadata(WSDL) Spoofing attack
Introduce malicious code to change the course of execution.
Attacker sending huge amounts of requests to a certain service and causing denial of service.
Malicious reengineering of Web Services’ metadata description
(T/F)Recovery Time Objective(RTO) represents the period of time allowed for the complete execution of the task.
False
Correct statements for necessary and sufficient conditions for the detection of inheritance conflict are:
Sufficient condition: current entry role is senior to at least one exit role.
Necessary condition: at least one exit role
Hypervisor risks associated with VM escape
Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
Improper configuration of VM.
(T/F) In fault tolerance, replication is the duplication of critical components of a system with the intention of increasing reliability of the system, usually in the case of a backup or fail-safe.
False
Open Source tools used for retrieving web pages in Amazon E2C platform
wget