ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 09 May 2017 My Price 9.00

NFA 610

NFA 610

 

Name:

 

Instructions: Please submit answers to the questions below.  Answers can be submitted on a separate answer key or can be inserted into this quiz.  The quiz is open-book and open notes.  All work must be completed individually, and a document containing your answers must be uploaded by the due date listed above.

 

MULTIPLE CHOICE QUESTIONS (2 points each):

 

1.      The buffer overflow type of attack has been known since it was first widely used by the __________ Worm in 1988.

A.  Code Red                          B.  Slammer

C.  Morris Internet                  D.  Alpha One

 

2.      A buffer _________ is a condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information.

A.  overflow                            B.  virus

C. trigger                                 D.  all of the above

 

3.      A consequence of a buffer overflow error is __________ .

 

A.    corruption of data used by the program

B.     unexpected transfer of control in the program

C.     possible memory access violation

D.    all of the above

 

4.       The function of ________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program.

A.  shellcode                           B.  stacking

C.  no-execute                         D.  memory management

 

5.  __________ is malware that encrypts the user’s data and demands payment in order to access the key needed to recover the information.

                              A.  Trojan horse                      B.  Ransomware

                              C.  Crimeware                         D.  Polymorphic

6.  A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.

                              A.  spam                                  B.  phishing

                              C.  DDoS                                D.  sniff

 

9.  __________ is the first function in the propagation phase for a network worm.

                              A.  Propagating                       B.  Fingerprinting

                              B.  Keylogging                        D.  Spear phishing

10.  The __________ is what the virus “does”.

                                    A.  infection mechanism         B.  trigger

                                    C.  logic bomb                        D.  payload

11.  The __________ is when the virus function is performed.

                                    A.  dormant phase                   B.  propagation phase

                                    C.  triggering phase                 D.  execution phase

12.  During the __________ the virus is idle.

                                    A.  dormant phase                   B.  propagation phase

                                    C.  triggering phase                 D.  execution phase

13.  A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim’s data is __________.

A.  Adobe                   B.  Animoto

C.  malware                 D.  Prezi         

 

14.  __________ are used to send large volumes of unwanted e-mail.

A.  Rootkits                B.  Spammer programs

C.  Downloaders         D.  Auto-rooter          

 

15.  A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.

A.   logic bomb           B.  trapdoor

C.   worm                    D.  Trojan horse

 

Questions (10 points each)

 

1.      Describe the security issues with virtual systems.

 

 

 

 

 

2.      What is the Linux/UNIX security model? How is it built around DAC?

 

Answers

(11)
Status NEW Posted 09 May 2017 08:05 AM My Price 9.00

-----------

Attachments

file 1494317996-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)