Chat with us, powered by LiveChat Quiz 2 INFA 610 Foundations Of Information Security And Assurance | Wridemy

Quiz 2 INFA 610 Foundations Of Information Security And Assurance

I have complete test bank for this class quiz message me for testbank

 

Name_________________________                                    Date____________________

·      There are 30 questions in this Quiz and each question is worth 2 points

·      The quiz is worth 10% of your final grade for the course.

·      For multiple choices, circle the option that best answers the question. For True/False, put either a T or F next to the question. For Fill in the blank choose your answer

·      Please provide your answers in the Answer Table below.

·      The quiz is due on Sunday November 1, 11:59 US EDT. Early submission is encouraged and is welcomed. There will be a 20% penalty for every day late (less than or equal 24 hours is considered a day) until no points are left.

·      The quiz is to be of your own work and no other individuals may assist you in this effort.

·      When applicable please provide your own examples to complement your material.

·      Please put your name & date at the top of the document and name your file using this file naming convention: fLastQuiz2.doc, e.g. the Quiz 1 file name for me would be aGhafarianQuiz1.doc

·      Please submit your work using the Quiz1 link in the Assignment area of LEO.

·      Use Cybercafé to post your questions about the Quiz but no questions about the questions themselves.

 

TRUE/FALSE QUESTIONS

1.     Malicious software aims to trick users into revealing sensitive personal data.

2.     Keyware captures keystrokes on a compromised system.

3.     The buffer overflow type of attack is one of the least commonly seen attacks

4.     Several of the items in the CWE/SANS Top 25 Most Dangerous Software Errors list, Risky Resource Management category, are buffer overflow variants.

5.     Security flaws occur as a consequence of sufficient checking and validation of data and error codes in programs.

6.     A difference between defensive programming and normal practices is that everything is assumed.

7.     It is possible for a system to be compromised during the installation process.

8.     Ideally new systems should be constructed on an unprotected network in order to prevent installation restrictions.

MULTIPLE CHOICES QUESTIONS

9.     A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim’s data is __________.

a.     Adobe

b.     Animoto

c.     malware

d.     Prezi

 

10.  A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.

a.     logic bomb

b.     trapdoor

c.     worm

d.     Trojan horse

 

11.  A _______ can occur as a result of a programming error when a process attempts to      store data beyond the limits of a fixed-size buffer.

a.     shellcode

b.     program overflow

c.     buffer overflow

d.     library function

 

12.  A ______ is a structure where data are usually saved on the stack.

a.     guard page

b.     stack frame

c.     heap

d.     NOP sled

 

13.  _________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.

a.     PHP attack

b.     Format string injection attack

c.     XSS  attack.

d.     Injection attack

 

14.  A _______ attack is where the input includes code that is then executed by the attacked system.

a.     SQL injection

b.     cross-site scripting

c.     code injection

d.     interpreter injection

 

 

15.  The first step in deploying new systems is _________.

a.     security testing

b.     installing patches

c.     planning

d.     secure critical content

 

16.  Which of the following need to be taken into consideration during the system  security planning process?

a.     how users are authenticated

b.     the categories of users of the system

c.     what access the system has to information stored on other hosts

d.     all of the above

 

FILL IN THE BLANK

17.  A _________ is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence of its presence.

 

18.  A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.

 

19.  The function of the _______ was to transfer control to a user command line interpreter that gave access to any program available on the system with the privileges of the attacked program.

 

20.  One of the restrictions on the content of shellcode is that it has to be _______, which means that it cannot contain any absolute address referring to itself.

 

21.  Two key areas of concern for any input are the _______ of the input and the meaning and interpretation of the input.

 

22.  A number of widely used standard C _________ compound the problem of buffer overflow by not providing any means of limiting the amount of data transferred to the space available in the buffer.

 

23.  System security begins with the installation of the ________.

 

24.  The final step in the process of initially securing the base operating system is ________.

 

25.  ______ is a reactive control that can only inform you about bad things that have already happened.

 

 

Answer Table

1  
2  
3  
4  
5  
6  
7  
8  
9  
10  
11  
12  
13  
14  
15  
16  
17  
18  
19  
20  
21  
22  
23  
24  
25  

 

Short Answer

26.  What are three broad mechanisms that malware can use to propagate?

27.  What are four broad categories of payloads that malware may carry?

28.  How does behavior- blocking software work?

29.  What is a digital immune system?

30.  There is a flaw in the virus program of Figure 6.1 . What is it?

 

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Wridemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order

Related Tags

Academic APA Writing College Course Discussion Management English Finance General Graduate History Information Justify Literature MLA