The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 4 Days Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Good evening, I need assistance with the attached document. Thank you for your time.
|
1 |
|
|
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
|
6 |
|
|
7 |
|
|
8 |
|
|
9 |
|
|
10 |
|
|
11 |
|
|
12 |
|
|
13 |
|
|
14 |
|
|
15 |
|
|
16 |
|
|
17 |
|
|
18 |
|
|
19 |
|
|
20 |
|
TRUE/FALSE QUESTIONS:
1. Malicious software aims to trick users into revealing sensitive personal data.
2. Keyware captures keystrokes on a compromised system.
3. Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.
4. A virus that attaches to an executable program can do anything that the program is permitted to do.
5. It is not possible to spread a virus via an USB stick.
6. A logic bomb is the event or condition that determines when the payload is activated or delivered.
MULTIPLE CHOICES QUESTIONS
7. Which one of the following malicious code objects might be insertedin an application by a disgruntled software developer with the purposeof destroying system data upon the deletion of the developer’s account(presumably following their termination)?
a. Virus
b. Worm
c. Trojan horse
d. Logic bomb
8. What term is used to describe code objects that act on behalf of a userwhile operating in an unattended manner?
a. Agent
b. Worm
c. Applet
d. Browser
9. Which of the following is not one of the methods to fight against spam?
a. Black box analysis
b. Grey box analysis
c. Redlisting
d. Content filtering
10. Which of the following characteristics can be used to differentiateworms from viruses?
a. Worms infect a system by overwriting data in the master bootrecord of a storage device.
b. Worms always spread from system to system without userintervention.
c. Worms always carry a malicious payload that impacts infectedsystems.
d. All of the above.
11. What programming language(s) can be used to develop ActiveXcontrols for use on an Internet site?
a. Visual Basic
b. C
c. Java
d. All of the above
12. John’s system was infected by malicious code that modified the operating system to allow the malicious code author to gain access to his files. What type of exploit did this attacker engage in?
a. Escalation of privilege
b. Backdoor
c. Rootkit
d. Buffer overflow
13. Which of the following is not a component in Windows OS security infrastructure?
a. The Security Reference Monitor (SRM)
b. The Local Security Authority (LSA)
c. The directory structure (TDS)
d. The Security Account Manager (SAM)
14. Incorrect handling of program _______ is one of the most common failings in software security.
a. Lines
b. Input
c. Output
d. disciplines
15. Defensive programming is sometimes referred to as _________.
a. variable programming
b. secure programming
c. interpretive programming
d. chroot programming
16. Which one of the following terms cannot be used to describe the mainRAM of a typical computer system?
a. Nonvolatile
b. Sequential access
c. Real memory
d. Primary memory
17. “Incorrect Calculation of Buffer Size” is in the __________ software error category
a. Porous Defenses
b. B. Allocation of Resources
c. C. Risky Resource Management
d. D. Insecure Interaction Between Components
18. The function of ________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program
a. shellcode
b. B. stacking
c. C. no-execute
d. D. memory management
19. Which software development life cycle model allows for multiple iterationsof the development process, resulting in multiple prototypes,each produced according to a complete design and testing process?
a. Software Capability Maturity Model
b. Waterfall model
c. Development cycle
d. Spiral model
20. In systems utilizing a ring protection scheme, at what layer does thesecurity kernel reside?
a. Layer 0
b. Layer 1
c. Layer 2
d. Layer 3
Attachments:
----------- ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly