Info Assurance Chapter 7-11 Questions
Chapter 11: Breanne's system was infected by malicious code after she installed an innocent-looking solitaire game that she downloaded from the Internet. What type of malware did she likely encounter?
Trojan Horse
A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword minus duplicates followed by the remaining letters of the alphabet.
True
In a chosen-ciphertext attack cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system.
True
The Data Link Layer of the OSI Reference Model is responsible for transmitting information on computers connected to the same local area network (LAN).
True
What is NOT one of the four main purposes of an attack?
Data import
Curtis is conducting an audit of an identity management system. Which question is NOT likely to be in the scope of his audit?
Does the firewall properly block unsolicited network connection attempts?
A packet-filtering firewall remembers information about the status of a network communication.
False
A physical courier delivering an asymmetric key is an example of in-band key exchange.
False
Another name for a border firewall is a DMZ firewall.
False
Chapter 10: A border router can provide enhanced features to internal networks and help keep subnet traffic separate.
False
Chapter 9: A private key cipher is also called an asymmetric key cipher.
False
Cryptographic key distribution is typically done by phone.
False
In a known-plaintext attack (KPA) the cryptanalyst has access only to a segment of encrypted data and has no choice as to what that data might be.
False
Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion alert each time that an administrator connects to a server using Secure Shell (SSH). What type of error is occurring?
False positive error
What is NOT a common motivation for attackers?
Fear
Adam discovers a virus on his system that is using encryption to modify itself. The virus escapes detection by signature-based antivirus software. What type of virus has he discovered?
Polymorphic virus
Chapter 8: Which data source comes first in the order of volatility when conducting a forensic investigation?
RAM
Gwen is investigating an attack. An intruder managed to take over the identity of a user who was legitimately logged into Gwen's company's website by manipulating Hypertext Transfer Protocol (HTTP) headers. Which type of attack likely took place?
Session hijacking
The CEO of Kelly's company recently fell victim to an attack. The attackers sent the CEO an email informing him that his company was being sued and he needed to view a subpoena at a court website. When visiting the website malicious code was downloaded onto the CEO's computer. What type of attack took place?
Spear phishing
Joe is responsible for the security of the industrial control systems for a power plant. What type of environment does Joe administer?
Supervisory Control and Data Acquisition (SCADA)
Chapter 7: What is NOT generally a section in an audit report?
System Configurations