SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 4 Days Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 15 Nov 2017 My Price 10.00

Malicious software aims to trick users into revealing sensitive

Good evening, I need assistance with the attached document. Thank you for your time.

 

Answer Table

1

 

2

 

3

 

4

 

5

 

6

 

7

 

8

 

9

 

10

 

11

 

12

 

13

 

14

 

15

 

16

 

17

 

18

 

19

 

20

 

 


TRUE/FALSE QUESTIONS:

1.    Malicious software aims to trick users into revealing sensitive personal data.

2.    Keyware captures keystrokes on a compromised system.

3.    Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.

4.    A virus that attaches to an executable program can do anything that the program is permitted to do.

5.    It is not possible to spread a virus via an USB stick.

6.    A logic bomb is the event or condition that determines when the payload is activated or delivered.


 

MULTIPLE CHOICES QUESTIONS

7.    Which one of the following malicious code objects might be insertedin an application by a disgruntled software developer with the purposeof destroying system data upon the deletion of the developer’s account(presumably following their termination)?

a.    Virus

b.    Worm

c.    Trojan horse

d.    Logic bomb

 

8.    What term is used to describe code objects that act on behalf of a userwhile operating in an unattended manner?

a.    Agent

b.    Worm

c.    Applet

d.    Browser

 

9.    Which of the following is not one of the methods to fight against spam?

a.    Black box analysis

b.    Grey box analysis

c.    Redlisting

d.    Content filtering

 

10.  Which of the following characteristics can be used to differentiateworms from viruses?

a.    Worms infect a system by overwriting data in the master bootrecord of a storage device.

b.    Worms always spread from system to system without userintervention.

c.    Worms always carry a malicious payload that impacts infectedsystems.

d.    All of the above.

 

11.  What programming language(s) can be used to develop ActiveXcontrols for use on an Internet site?

a.    Visual Basic

b.    C

c.    Java

d.    All of the above

 

12.  John’s system was infected by malicious code that modified the operating system to allow the malicious code author to gain access to his files. What type of exploit did this attacker engage in?

a.    Escalation of privilege

b.    Backdoor

c.    Rootkit

d.    Buffer overflow

 

13.  Which of the following is not a component in Windows OS security infrastructure?

a.    The Security Reference Monitor (SRM)

b.    The Local Security Authority (LSA)

c.    The directory structure (TDS)

d.    The Security Account Manager (SAM)

 

14.  Incorrect handling of program _______ is one of the most common failings in software security.

a.    Lines

b.    Input

c.    Output

d.    disciplines

 

15.  Defensive programming is sometimes referred to as _________.

a.    variable programming

b.    secure programming

c.    interpretive programming

d.    chroot programming

 

16.  Which one of the following terms cannot be used to describe the mainRAM of a typical computer system?

a.    Nonvolatile

b.    Sequential access

c.    Real memory

d.    Primary memory

 

17.  “Incorrect Calculation of Buffer Size” is in the __________ software error category

a.    Porous Defenses                         

b.    B.  Allocation of Resources

c.    C.  Risky Resource Management           

d.    D.  Insecure Interaction Between Components

 

18.  The function of ________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program

a.    shellcode

b.    B.  stacking

c.    C.  no-execute

d.    D.  memory management

 

19.  Which software development life cycle model allows for multiple iterationsof the development process, resulting in multiple prototypes,each produced according to a complete design and testing process?

a.    Software Capability Maturity Model

b.    Waterfall model

c.    Development cycle

d.    Spiral model

 

20.  In systems utilizing a ring protection scheme, at what layer does thesecurity kernel reside?

a.    Layer 0

b.    Layer 1

c.    Layer 2

d.    Layer 3

 

Attachments:

Answers

(5)
Status NEW Posted 15 Nov 2017 06:11 AM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)