Info Sec - FINAL QUIZZES

5.0(1)
studied byStudied by 32 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:07 PM on 5/1/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

21 Terms

1
New cards

What virus structure is valid (can be more than one):

  • Prepending Malware

  • Multi-Cavity Malware

  • Cavity Malware

  • Appending Malware

ALL OF THE ABOVE

2
New cards

Suppose, you are planning to detect previously unseen malware. Which approach will be the best for this scenario?

  • Virus Family Detection

  • Rule-based approach

  • Anomaly detection

  • Signature-based detection

Anomaly Detection

3
New cards

(TRUE OR FALSE): Worm propagation model starts with slow start phase and ends with slow finish phase.

TRUE

4
New cards

(TRUE OR FALSE): A virus is code embedded in a file or program.

TRUE

5
New cards

Which strategy we can adopt to detect virus? (can be more than one):

  • Scanning

  • Interception

  • Complex Password Policy

  • Integrity Checking

  • Scanning

  • Interception

  • Integrity Checking

6
New cards

Select the obfuscations technique which doesn't apply for evasion.

  • None of the above

  • Eavesdropping Attack

  • Register Renaming

  • NOP Insertion

None of the above

7
New cards

If you declare an array as A[100] in C and you try to write data to A[101], what will happen?

  • Whatever is at A[101] will be overwritten

  • Nothing

  • The C compiler will give you an error and won’t compile

  • There will always be a runtime error

Whatever is at A[101] will be overwritten

8
New cards

Which programming languages are commonly susceptible to buffer overflow attacks?

  • Ruby and JavaScript

  • PHP and HTML

  • C and C++

  • Java and Python

C and C++

9
New cards

What is a buffer overflow attack?

  • An attack that overflows a computer's memory buffer, allowing the attacker to execute arbitrary code.

  • An attack that steals sensitive information from a computer by exploiting security vulnerabilities.

  • An attack that floods a network with traffic, causing it to crash.

  • An attack that disables a computer's firewall, allowing unauthorized access.

An attack that overflows a computer's memory buffer, allowing the attacker to execute arbitrary code.

10
New cards

What is the best practice for preventing buffer overflow attacks in software development? (select all that apply)

  • Interception

  • Use input validation in the code.

  • Regularly update antivirus software.

  • Proper bounds checking in the code.

  • Use input validation in the code.

  • Proper bounds checking in the code.

11
New cards

What can make a buffer overflow a security problem? (select all that applies)

  • Only when the attacker is able to hijack the execution of the program

  • When security-sensitive data is overwritten

  • When data that is critical to the execution of the program is overwritten causing the program to crash

  • Only when the buffer overflow is between two computers on a network

  • When security-sensitive data is overwritten

  • When data that is critical to the execution of the program is overwritten causing the program to crash

12
New cards

Which of these kinds of inputs can cause a buffer overflow. (select all that applies)

  • An environment variable

  • A floating point number

  • String input from the user

  • A single integer

ALL OF THE ABOVE

13
New cards

What is NOT the important elements of Taint Analysis?

  • Taint Seed

  • Symbolic Engine

  • Taint Sink

  • Taint Propagation Policy

Symbolic Engine

14
New cards

What can be overwritten by a buffer overflow that causes a security problem. (select all that applies)

  • A return pointer

  • Anything that will make the program

  • Any kind of pointer

  • Security-sensitive data

ALL OF THE ABOVE

15
New cards

Which kinds of operations are most likely to lead to buffer overflows in C?

  • Indexing of arrays

  • Valid value assignment

  • Floating point addition

  • Dereferencing a pointer

Indexing of arrays

16
New cards

Which of these processes is likely to catch a buffer overflow?

  • Compilation

  • Testing by a software developer

  • All of the above

  • Code inspection

ALL OF THE ABOVE

17
New cards

What is the goal for Automated Testing?

  • All of the above

  • Find crashes

  • Find security vulnerabilities

  • Find most assertion violations

ALL OF THE ABOVE

18
New cards

What are the variations of secret token validations?

  • Session Independent Token

  • All of the above

  • Session Dependent Token

  • Session Identifier

ALL OF THE ABOVE

19
New cards

How can one separate a same site request from a cross-site? 

  • All of the above

  • Using Cookie Authentication

  • Using Secret Token Validation

  • Using Referrer Header

Using Referrer Header

20
New cards

(TRUE OR FALSE): Cookie Authentication will prevent cross-site request forgery.

TRUE

21
New cards

What is a true statement?

  • All of the above

  • Source code is unavailable in black box testing

  • Source code is available in white box testing

  • Seeds denotes the starting point of fuzzing process

ALL OF THE ABOVE

Explore top flashcards

Module 9
Updated 705d ago
flashcards Flashcards (56)
Unit 6 + 7 History
Updated 663d ago
flashcards Flashcards (133)
gd (prefi2)
Updated 102d ago
flashcards Flashcards (26)
Unit 5: Kinetics
Updated 68d ago
flashcards Flashcards (21)
Module 9
Updated 705d ago
flashcards Flashcards (56)
Unit 6 + 7 History
Updated 663d ago
flashcards Flashcards (133)
gd (prefi2)
Updated 102d ago
flashcards Flashcards (26)
Unit 5: Kinetics
Updated 68d ago
flashcards Flashcards (21)