Question

TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance


1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program.

2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values.

3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC) access to require authentication.

4. The Zotob worm, which took advantage of a vulnerability in Microsoft Plug and Play (PnP) and which was accessible through RPC, did not affect Windows XP SP2, even the coding bug was there.

5. Key issues from a software security perspective are whether the implemented algorithm correctly solves the specified problem, whether the machine instructions executed correctly represent the high level algorithm specification, and whether the manipulation of data values in variables is valid and meaningful.

6. C’s designers placed much more emphasis on space efficiency and performance considerations than on type safety.

7. An effective method for protecting programs against classic stack overflow attacks is to instrument the function entry and exit code to setup and then check its stack frame for any evidence of corruption.

8. From the attacker’s perspective, the challenge in cracking a Linux system therefore boils down to gaining root privileges.

9. AppArmor is built on the assumption that the single biggest attack vector on most systems is application vulnerabilities. If the application's behavior is restricted, then the behavior of any attacker who succeeds in exploiting some vulnerability in that application will also be restricted.

10. A very common configuration fault seen with Web and file transfer servers is for all the files supplied by the service to be owned by the same “user” account that the server executes as.

11. Programmers use trapdoors legitimately to debug and test programs.


12. If the compromised machine uses encrypted communication channels, then just sniffing the network packets on the victim’s computer is useless because the appropriate key to decrypt the packets is missing.

13. Packet sniffers are seldom used to retrieve sensitive information like usernames and passwords.

14. Buffer overflows can be found in a wide variety of programs.

15. EFS allows files and directories to be encrypted and decrypted transparently for authorized users. All versions of Windows since Windows 2000 support Encryption File System.

16. A bot propagates itself and activates itself, whereas a worm is initially controlled from some central facility.

17. The correct implementation in the case of an atomic operation is to test separately for the presence of the lockfile and to not always attempt to create it.

18. Kernel space is swapped to hard disk in order to obtain quick access.

19. Performing regular backups of data on a system is a critical control that assists with maintaining the integrity of the system and user data.

20. Backup and archive processes are often linked and managed separately.

MULTIPLE CHOICE QUESTIONS:


1. ______ systems should not run automatic updates because they may possibly introduce instability.

A. Change controlled B. Policy controlled

C. Configuration controlled D. Process controlled

E. None of the above

2. _________ are a collection of string values inherited by each process from its parent that can affect the way a running process behaves.

A. Race conditions B. Deadlocks

C. Privileges D. all of the above

E. None of the above


3. Windows Vista and later add two other functions. The first is that the firewall is a ______________ of the rewritten TCP/IP networking stack. Second, the firewall supports optionally blocking outbound.

A. fully integrated component B. 50% integrated component model

C. partially integrated component D. None of the above



4. ___________ does its business (covering the tracks of attackers) in kernel space, intercepting system calls pertaining to any user’s attempts to view the intruder’s resources.

A. A MKLKM rootkit B. A MKLKM sourcekit

C. An LKM rootkit D. None of the above

5. SELinux is a ____________ implementation that doesn't prevent zero-day attacks, but it's specifically designed to contain their effects.

A. mandatory access B. fully access control

C. mandatory access control D. None of the above

6. ________ involve buffers located in the program’s global (or static) data area.

A. Heap overflows B. Stack buffer overflows

C. Global Data Area Overflows D. Position overflows

7. In SELinux objects include not only files and directories but also other processes and various system resources in ______________.

A. kernel space only

B. both kernel space and userland

C. remote RAID, USB flash memory and network storage.

D. None of the above

8. __________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions.

A. Fingerprint-based scanners B. Action-blocking scanners

C. Generic decryption technology D. Heuristic scanners

E. None of the above


9. A ___________ is a root-owned program with its setuid bit set; that is, a program that runs as root no matter who executes it.

A. setgid root program B. setsid root program

C. setuid root program D. None of the above


10. A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.

A. spam B. phishing

C. DDoS D. sniff

E. None of the above

11. Due to a history of abuse against setuid root programs, major Linux distributions no longer ship with unnecessary setuid-root programs. But ______________ for them.

A. system attackers still could not scan B. system attackers still scan

C. system attackers still embed D. None of the above

12. SELinux implements different types of MAC: ________________________.

A. Style Enforcement, and Role Based Access Controls,

B. Multi Level Security, Role Based Access Controls and Type Enforcement,

C. Multi Task Level Security

D. None of the above

13. __________ is malware that encrypts the user’s data and demands payment in order to access the key needed to recover the information.

A. Trojan horse B. Ransomware

C. Crimeware D. Polymorphic

E. None of the above

14. The most common variant of injecting malicious script content into pages returned to users by the targeted sites is the _________ vulnerability.

A. PHP file inclusion B. chroot jail

C. atomic bomb D. XSS reflection

E. None of the above


15. Versions of Windows based on the Windows 95 code base, including Windows 98, Windows 98 SE, and Windows Me, had ____________, in contrast to the Windows NT code base, on which all current versions of Windows are based.

A. security model B. token model

C. two security models D. None of the above

16. In Linux system, a vulnerability is a specific weakness or security-related bug in an application or operating system. A threat is the combination of a vulnerability, an attacker, and _________________.

A. None of the above B. a weakness vector

C. an attack and vulnerability vector D. an attack vector


17. A runtime technique that can be used is to place ________ between critical regions of memory in a processes address space.

A. guard pages B. library functions

C. shellcodes D. MMUs

E. None of the above

18. _______ defenses involve changes to the memory management of the virtual address space of processes that act to either alter the properties of regions of memory or to make predicting the location of target buffers sufficiently difficult to thwart many types of attacks.

A. Run-time B. Position independent

C. Buffer D. Compile-time

E. None of the above

19. Windows Vista and later changes the default; all user accounts are users and not administrators. This is referred to as ______________

  1. User Control Account (UCA.)

  2. Tolerance User Account Control (TUAC.)

  3. Preventive User Account Control (PUAC.)

D. None of the above

20. ______ are resources that should be used as part of the system security planning process.

A. Texts

B. Online resources

C. Specific system hardening guides

D. All of the above

E. None of the above

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Please note: I have answered the First four Questions according to the Chegg Answering Guidelines. Please Re-post for the rest of the Questions.

1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. – This is True

2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. - True

3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC) access to require authentication. - True

4. The Zotob worm, which took advantage of a vulnerability in Microsoft Plug and Play (PnP) and which was accessible through RPC, did not affect Windows XP SP2, even the coding bug was there. – True, this is because the attacker should be authenticated first

Add a comment
Know the answer?
Add Answer to:
TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Which of the following is not a step of AES? a. Byte Substitution b. Add Round...

    Which of the following is not a step of AES? a. Byte Substitution b. Add Round key c. Mix Column d. Choice Permutation Which of the following is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or data on the system? a. Risk b. Exploit c. Mitigation d. Vulnerability Which of the following is not a phase in a worm attack? a. Paralyze b. Propagate c. Eradicate d. Persist The...

  • Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion...

    Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...

  • The following vulnerabilities were discovered in a company’s standard-issue mobile devices: Vulnerability A: An information disclosure...

    The following vulnerabilities were discovered in a company’s standard-issue mobile devices: Vulnerability A: An information disclosure vulnerability in kernel components could enable a local malicious application to access outside of its permission levels after first compromising a privileged process mote Vulnerability B: LibUtils mishandles conversions between Unicode character encodings with different encoding widths, which a ows remote attackers to execute arbitrary code or cause a denial of service via a crafted file Vulnerability C: An elevation of privilege vulnerability in...

  • its true or false questions 1. A computer security risk is any event or action that...

    its true or false questions 1. A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability 2. A cybercrime is an online or Internet-based illegal act 3. Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises 4. Users can take several precautions to protect their home and work computers and mobile devices from these malicious...

  • Information Security Exploits flaws in computer systems for nefarious reasons Represents people who use technology as...

    Information Security Exploits flaws in computer systems for nefarious reasons Represents people who use technology as a tool for anarchy Reflects lax attitudes and management failures Protects information and the systems that use, store and transmit it Results from power irregularities and ISP disruptions In an indirect attack approach The criminal breaks into a system using his or her own computer The nefarious message appears to be coming from a trusted source Data traveling over a network is monitored without...

  • 1) Information security procedures protect information integrity A) preventing fictitious transactions. B) reducing the system cost....

    1) Information security procedures protect information integrity A) preventing fictitious transactions. B) reducing the system cost. C) making the system more efficient. D) making it impossible for unauthorized users to access the system. 2) There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the "black hat" hackers. He had researched an exploit and determined that he could penetrate the target system, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes...

  • Computer Security Help 21) The process of keeping a backup copy of each file being worked...

    Computer Security Help 21) The process of keeping a backup copy of each file being worked on by backing it up every few minutes is called ________. A) file backup B) file/folder backup C) image backup D) shadowing 22) Attacks other than application level attacks usually fail to get through SPI firewalls. True False Save 23) Normally, there is no limit on how long shadowing may maintain backed up files. True False 24) Java applets are large Java programs. Question...

  • Question 1 1 point possible (graded) True or False: Because IoT is an ecosystem, IoT Security...

    Question 1 1 point possible (graded) True or False: Because IoT is an ecosystem, IoT Security is not just device security. True False Question 2 1 point possible (graded) When comparing IoT malware to traditional viruses, worms, or spam, which of these statements are true? (Select three) Conventional anti-virus or anti-spam schemes work well for IoT malware detection and prevention. IoT malware has much less user interaction. IoT malware is hard to kill due to lack of direct interface with...

  • Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. ...

    Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. A signed applet can be hijacked. The spiral model is an iterative model designed to enable the construction of increasingly complex versions of a project. The generation of a real random number is a trivial task. Buffer overflow is one of the most common web attack methodologies. Compilers create runtime code that can be executed via an interpreter engine, like a Java virtual machine (JVM),...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT