The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
NFA 610
Name:
Instructions: Please submit answers to the questions below. Answers can be submitted on a separate answer key or can be inserted into this quiz. The quiz is open-book and open notes. All work must be completed individually, and a document containing your answers must be uploaded by the due date listed above.
MULTIPLE CHOICE QUESTIONS (2 points each):
1. The buffer overflow type of attack has been known since it was first widely used by the __________ Worm in 1988.
A. Code Red B. Slammer
C. Morris Internet D. Alpha One
2. A buffer _________ is a condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information.
A. overflow B. virus
C. trigger D. all of the above
3. A consequence of a buffer overflow error is __________ .
A. corruption of data used by the program
B. unexpected transfer of control in the program
C. possible memory access violation
D. all of the above
4. The function of ________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program.
A. shellcode B. stacking
C. no-execute D. memory management
5. __________ is malware that encrypts the user’s data and demands payment in order to access the key needed to recover the information.
A. Trojan horse B. Ransomware
C. Crimeware D. Polymorphic
6. A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.
A. spam B. phishing
C. DDoS D. sniff
9. __________ is the first function in the propagation phase for a network worm.
A. Propagating B. Fingerprinting
B. Keylogging D. Spear phishing
10. The __________ is what the virus “does”.
A. infection mechanism B. trigger
C. logic bomb D. payload
11. The __________ is when the virus function is performed.
A. dormant phase B. propagation phase
C. triggering phase D. execution phase
12. During the __________ the virus is idle.
A. dormant phase B. propagation phase
C. triggering phase D. execution phase
13. A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim’s data is __________.
A. Adobe B. Animoto
C. malware D. Prezi
14. __________ are used to send large volumes of unwanted e-mail.
A. Rootkits B. Spammer programs
C. Downloaders D. Auto-rooter
15. A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.
A. logic bomb B. trapdoor
C. worm D. Trojan horse
Questions (10 points each)
1. Describe the security issues with virtual systems.
2. What is the Linux/UNIX security model? How is it built around DAC?
-----------