The writer is very fast, professional and responded to the review request fast also. Thank you.
I have complete test bank for this class quiz message me for testbank
Name_________________________ Date____________________
· There are 30 questions in this Quiz and each question is worth 2 points
· The quiz is worth 10% of your final grade for the course.
· For multiple choices, circle the option that best answers the question. For True/False, put either a T or F next to the question. For Fill in the blank choose your answer
· Please provide your answers in the Answer Table below.
· The quiz is due on Sunday November 1, 11:59 US EDT. Early submission is encouraged and is welcomed. There will be a 20% penalty for every day late (less than or equal 24 hours is considered a day) until no points are left.
· The quiz is to be of your own work and no other individuals may assist you in this effort.
· When applicable please provide your own examples to complement your material.
· Please put your name & date at the top of the document and name your file using this file naming convention: fLastQuiz2.doc, e.g. the Quiz 1 file name for me would be aGhafarianQuiz1.doc
· Please submit your work using the Quiz1 link in the Assignment area of LEO.
· Use Cybercafé to post your questions about the Quiz but no questions about the questions themselves.
TRUE/FALSE QUESTIONS
1. Malicious software aims to trick users into revealing sensitive personal data.
2. Keyware captures keystrokes on a compromised system.
3. The buffer overflow type of attack is one of the least commonly seen attacks
4. Several of the items in the CWE/SANS Top 25 Most Dangerous Software Errors list, Risky Resource Management category, are buffer overflow variants.
5. Security flaws occur as a consequence of sufficient checking and validation of data and error codes in programs.
6. A difference between defensive programming and normal practices is that everything is assumed.
7. It is possible for a system to be compromised during the installation process.
8. Ideally new systems should be constructed on an unprotected network in order to prevent installation restrictions.
MULTIPLE CHOICES QUESTIONS
9. A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim’s data is __________.
a. Adobe
b. Animoto
c. malware
d. Prezi
10. A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.
a. logic bomb
b. trapdoor
c. worm
d. Trojan horse
11. A _______ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer.
a. shellcode
b. program overflow
c. buffer overflow
d. library function
12. A ______ is a structure where data are usually saved on the stack.
a. guard page
b. stack frame
c. heap
d. NOP sled
13. _________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.
a. PHP attack
b. Format string injection attack
c. XSS attack.
d. Injection attack
14. A _______ attack is where the input includes code that is then executed by the attacked system.
a. SQL injection
b. cross-site scripting
c. code injection
d. interpreter injection
15. The first step in deploying new systems is _________.
a. security testing
b. installing patches
c. planning
d. secure critical content
16. Which of the following need to be taken into consideration during the system security planning process?
a. how users are authenticated
b. the categories of users of the system
c. what access the system has to information stored on other hosts
d. all of the above
FILL IN THE BLANK
17. A _________ is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence of its presence.
18. A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.
19. The function of the _______ was to transfer control to a user command line interpreter that gave access to any program available on the system with the privileges of the attacked program.
20. One of the restrictions on the content of shellcode is that it has to be _______, which means that it cannot contain any absolute address referring to itself.
21. Two key areas of concern for any input are the _______ of the input and the meaning and interpretation of the input.
22. A number of widely used standard C _________ compound the problem of buffer overflow by not providing any means of limiting the amount of data transferred to the space available in the buffer.
23. System security begins with the installation of the ________.
24. The final step in the process of initially securing the base operating system is ________.
25. ______ is a reactive control that can only inform you about bad things that have already happened.
Answer Table
1 |
|
2 |
|
3 |
|
4 |
|
5 |
|
6 |
|
7 |
|
8 |
|
9 |
|
10 |
|
11 |
|
12 |
|
13 |
|
14 |
|
15 |
|
16 |
|
17 |
|
18 |
|
19 |
|
20 |
|
21 |
|
22 |
|
23 |
|
24 |
|
25 |
|
Short Answer
26. What are three broad mechanisms that malware can use to propagate?
27. What are four broad categories of payloads that malware may carry?
28. How does behavior- blocking software work?
29. What is a digital immune system?
30. There is a flaw in the virus program of Figure 6.1 . What is it?
Answers
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more