Security Midterm
Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information? - Sarbanes-Oxley Act (Sarbox) -Health Insurance Portability and Accountability Act (HIPAA) - Gramm-Leach-Bliley Act (GLBA) - Financial and Personal Services Disclosure Act
- Gramm-Leach-Bliley Act (GLBA)
Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum? 1 0 2 16
0
How can an attacker use a hoax? A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings. Hoaxes are not used by attackers today. By sending out a hoax, an attacker can convince a user to read his email more often. A user who receives multiple hoaxes could contact his supervisor for help.
A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings.
Which of the following is NOT correct about a rootkit? A rootkit is always the payload of a Trojan. A rootkit is able to hide its presence or the presence of other malware. The risk of a rootkit is less today than previously. A rootkit accesses "lower layers" of the operating system.
A rootkit is always the payload of a Trojan.
Which of these is the strongest symmetric cryptographic algorithm? Advanced Encryption Standard Triple Data Encryption Standard Data Encryption Standard RC 1
Advanced Encryption Standard
Which tool is most commonly associated with nation state threat actors? Advanced Persistent Threat (APT) Network Spider and Worm Threat (NSAWT) Unlimited Harvest and Secure Attack (UHSA) Closed-Source Resistant and Recurrent Malware (CSRRM)
Advanced Persistent Threat (APT)
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? Bob's public key Bob's private key Alice's private key Alice's public key
Alice's public key
Which trust model has multiple CAs, one of which acts as a facilitator? Bridge Hierarchical Distributed Web
Bridge
What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments? Cyberterrorists Brokers Competitors Resource managers
Brokers
An entity that issues digital certificates is a _____. Certificate Authority (CA) Digital Signer (DS) Signature Authority (SA) Certificate Signatory (CS)
Certificate Authority (CA)
A centralized directory of digital certificates is called a(n) _____. Digital Signature Approval List (DSAP) Digital Signature Permitted Authorization (DSPA) Certificate Repository (CR) Authorized Digital Signature (ADS)
Certificate Repository (CR)
Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted? Electronic Code Book (ECB) Cipher Block Chaining (CBC) Galois/Counter (GCM) Counter (CTR)
Cipher Block Chaining (CBC)
Which of these is NOT a characteristic of a secure hash algorithm? Collisions should be rare. The results of a hash function should not be reversed. The hash should always be the same fixed size. A message cannot be produced from a predefined hash.
Collisions should be rare.
What is the name of the threat actor's computer that gives instructions to an infected computer? Resource server Regulating Net Server (RNS) Command and control (C&C) server Monitoring and Infecting (M&I) server
Command and control (C&C) server
Which of the following ensures that only authorized parties can view protected information? Availability Authorization Confidentiality Integrity
Confidentiality
What entity calls in crypto modules to perform cryptographic tasks? Intermediate CA Certificate Authority (CA) OCSP Chain Crypto service provider
Crypto service provider
Astrid's computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which time she will receive a means to unlock the files. What type of malware has infected her computer? Blocking virus Networked worm Crypto-malware Bitcoin malware
Crypto-malware
Which of the following key exchanges uses the same keys each time? Diffie-Hellman (DH) Elliptic Curve Diffie-Hellman (ECDH) Diffie-Hellman Ephemeral (DHE) Diffie-Hellman-RSA (DHRSA)
Diffie-Hellman (DH)
An organization that practices purchasing products from different vendors is demonstrating which security principle? Obscurity Layering Diversity Limiting
Diversity
What is the difference between a DoS and a DDoS attack? DoS attacks use fewer computers than DDoS attacks DoS attacks are faster than DDoS attacks DoS attacks use more memory than a DDoS attack DoS attacks do not use DNS servers as DDoS attacks do
DoS attacks use fewer computers than DDoS attacks
Which digital certificate displays the name of the entity behind the website? Extended Validation (EV) Certificate X.509 Certificate Online Certificate Status Certificate Session Certificate
Extended Validation (EV) Certificate
Gunnar is creating a document that explains risk response techniques. Which of the following would he NOT list and explain in his document? Transfer risk Mitigate risk Extinguish risk Avoid risk
Extinguish risk
Which the following is NOT a reason why it is difficult to defend against today's attackers? Greater sophistication of defense tools Increased speed of attacks Delays in security updating Simplicity of attack tools
Greater sophistication of defense tools
Olivia was asked to protect the system from a DNS poisoning attack. What are the locations she would need to protect? Reply referrer and domain buffer Web browser and browser add-on Web server buffer and host DNS server Host table and external DNS server
Host table and external DNS server
Which of the following is an enterprise critical asset? Servers, routers, and power supplies Outsourced computing services System software Information
Information
Lykke receives a call while working at the helpdesk from someone who needs his account reset immediately. When Lykke questions the caller, he says, "If you don't reset my account immediately, I will call your supervisor!" What psychological approach is the caller attempting to use on Lykke? Familiarity Consensus Intimidation Scarcity
Intimidation
Which statement is NOT true regarding hierarchical trust models? It assigns a single hierarchy with one master CA. It is designed for use on a large scale. The master CA is called the root. The root signs all digital certificate authorities with a single key.
It is designed for use on a large scale.
What is a characteristic of the Trusted Platform Module (TPM)? It provides cryptographic services in hardware instead of software It is available only on Windows computers running BitLocker It includes a pseudorandom number generator (PRNG) It allows the user to boot a corrupted disk and repair it
It provides cryptographic services in hardware instead of software
At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why did he say that? It is an unproven approach and has never been tested. It would be too costly to have one isolated server by itself. It would be essentially impossible to keep its location a secret from everyone. It depends too heavily upon non-repudiation in order for it to succeed.
It would be too costly to have one isolated server by itself. It would be essentially impossible to keep its location a secret from everyone.
_____ refers to a situation in which keys are managed by a third party, such as a trusted CA. Key escrow Key authorization Trusted key authority Remote key administration
Key escrow
What type of attack intercepts legitimate communication and forges a fictitious response to the sender? MITM interceptor SIDS SQL intrusion
MITM
What type of attack involves manipulating third-party ad networks? Malvertising Directory traversal Clickjacking Session advertising
Malvertising
Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful. She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation? End-of-life systems Lack of vendor support Large number of vulnerabilities Misconfigurations
Misconfigurations
Signe wants to improve the security of the small business where she serves as a security manager. She determines that the business needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use? Limiting Obscurity Diversity Layering
Obscurity
_____ performs a real-time lookup of a digital certificate's status. Certificate Revocation List (CRL) Online Certificate Status Protocol (OCSP) Real-Time CA Verification (RTCAV) CA Registry Database (CARD)
Online Certificate Status Protocol (OCSP)
Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser? Add-ons Extensions Scripts Plug-ins
Plug-ins
Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about? Amplification Session replay Scaling exploit Privilege escalation
Privilege escalation
Which of the following is NOT a successive layer in which information security is achieved? Products Purposes Procedures People
Purposes
Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free program to receive weather reports, but the program had also installed malware on the computer that gave the threat actor unrestricted access to the computer. What type of malware had been downloaded? virus ransomware Trojan RAT
RAT
Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this? ROT13 Alphabetic AES XAND13
ROT13
Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose? SHA-2 RSA BTC-2 ME-312
RSA
What are industry-standard frameworks and reference architectures that are required by external agencies known as? Mandatory Compulsory Regulatory Required
Regulatory
What is the latest version of the Secure Hash Algorithm? SHA-2 SHA-4 SHA-5 SHA-3
SHA-3
_____ is a protocol for securely accessing a remote computer. Secure Shell (SSH) Transport Layer Security (TLS) Secure Sockets Layer (SSL) Secure Hypertext Transport Protocol (SHTTP)
Secure Shell (SSH)
Ian recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users' needs. Which of these generally recognized security positions has Ian been offered? Security manager Security administrator Security officer Security technician
Security administrator
Adone is attempting to explain to his friend the relationship between security and convenience. Which of the following statements would he use? Security and convenience are not related. Convenience always outweighs security. Security and convenience are inversely proportional. Whenever security and convenience intersect, security always wins.
Security and convenience are inversely proportional.
Which of the following is NOT true regarding security? Security is a process. Security includes the necessary steps to protect from harm. Security is a war that must be won at all costs. Security is a goal.
Security is a war that must be won at all costs.
Which of these could NOT be defined as a logic bomb? Erase all data if Matilda's name is removed from the list of employees. Send spam email to Moa's inbox on Tuesday. If the company's stock price drops below $100, then credit Juni's account with 10 additional years of retirement credit. Reformat the hard drive three months after Sigrid left the company.
Send spam email to Moa's inbox on Tuesday.
_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity. Digital digests Session keys Digital certificates Encrypted signatures
Session keys
Which statement regarding a keylogger is NOT true? Software keyloggers are generally easy to detect. Software keyloggers can be designed to send captured information automatically back to the attacker through the Internet. Keyloggers can be used to capture passwords, credit card numbers, or personal information. Hardware keyloggers are installed between the keyboard connector and computer keyboard USB port.
Software keyloggers are generally easy to detect.
Which of these is considered the strongest cryptographic transport protocol? SSL v2.0 TLS v1.0 TLS v1.2 SSL v2.0
TLS v1.2
Which of the following is defined as following an authorized person through a secure door? Tagging Tailgating Backpacking Caboosing
Tailgating
Why do cyberterrorists target power plants, air traffic control centers, and water systems? The targets are privately owned and cannot afford high levels of security. These targets are government-regulated and any successful attack would be considered a major victory. They can cause significant disruption by destroying only a few targets. These targets have notoriously weak security and are easy to penetrate.
They can cause significant disruption by destroying only a few targets.
Why are extensions, plug-ins, and add-ons considered to be security risks? They cannot be uninstalled. They are written in Java, which is a weak language. They use bitcode. They have introduced vulnerabilities in browsers.
They have introduced vulnerabilities in browsers.
What is an objective of state-sponsored attackers? To amass fortune over of fame To spy on citizens To sell vulnerabilities to the highest bidder To right a perceived wrong
To spy on citizens
Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks? The complex nature of TCP/IP allows for too many ping sweeps to be blocked. Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks. Web application attacks use web browsers that cannot be controlled on a local computer. Network security devices cannot prevent attacks from web resources.
Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks.
Attackers who register domain names that are similar to legitimate domain names are performing _____. HTTP manipulation HTML squatting Address resolution URL hijacking
URL hijacking
Which of the following is NOT a method for strengthening a key? Randomness Variability Cryptoperiod Length
Variability
Tatyana is discussing with her supervisor potential reasons why a recent attack was successful against one of their systems. Which of the following configuration issues would NOT be covered? Vulnerable business processes Misconfigurations Default configurations Weak configurations
Vulnerable business processes
Which variation of a phishing attack sends phishing messages only to wealthy individuals? Spear phishing Whaling Target phishing Microing
Whaling
What is a race condition? When a vulnerability is discovered and there is a race to see if it can be patched before it is exploited by attackers. When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences. When a software update is distributed prior to a vulnerability being discovered. When an attack finishes its operation before antivirus can complete its work.
When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.
Which attack uses the user's web browser settings to impersonate that user? XDD XSRF Session hijacking Domain hijacking
XSRF
John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing? XSRF DDoS DNS XSS SQL
XSS
What is a session token? a random string assigned by a web server a unique identifier that includes the user's email address another name for a third-party cookie XML code used in an XML injection attack
a random string assigned by a web server
watering hole attack is directed against which of the following? a smaller group of specific users all users of a large corporation wealthy individuals attackers who send spam
a smaller group of specific users
Which of these is NOT part of the certificate life cycle? revocation authorization expiration creation
authorization
Linnea's father called her to say that a message suddenly appeared on his screen that says his software license has expired and he must immediately pay $500 to have it renewed before control of the computer will be returned to him. What type of malware is this? Trojanware blocking ransomware lockoutware persistent virusware
blocking ransomware
Which of these items retrieved through dumpster diving would NOT provide useful information? calendars organizational charts memos books
books
What is the term used for a threat actor who controls multiple bots in a botnet? zombie shepherd bot herder cyber-robot rogue IRC
bot herder
A(n) _____ is a published set of rules that govern the operation of a PKI. signature resource guide (SRG) certificate practice statement (CPS) enforcement certificate (EF) certificate policy (CP)
certificate policy (CP)
Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing? confusion chaos diffusion integrity
confusion
Which of the following is NOT a primary trait of malware? circulation concealment infection diffusion
diffusion
A(n) _____ is not decrypted but is only used for comparison purposes. algorithm digest key stream
digest
The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _____. digital signature encrypted signature digital certificate digest
digital certificate
The Hashed Message Authentication Code (HMAC) _____. hashes the DHE key only hashes only the key hashes the key and the message hashes only the message
hashes the key and the message
Hedda pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Hedda performed? luring aliasing impersonation duplicity
impersonation
Which areas of a file cannot be used by steganography to hide data? in data that is used to describe the content or structure of the actual data in the file header fields that describe the file in the directory structure of the file system in areas that contain the content data itself
in the directory structure of the file system
An attacker who manipulates the maximum size of an integer type would be performing what kind of attack? integer overflow buffer overflow number overflow heap overflow
integer overflow
Public key infrastructure (PKI) _____. generates public/private keys automatically is the management of digital certificates requires the use of an RA instead of a CA creates private key cryptography
is the management of digital certificates
Each of these is a reason why adware is scorned EXCEPT _____. it can interfere with a user's productivity it displays objectionable content it displays the attacker's programming skills it can cause a computer to crash or slow down
it displays the attacker's programming skills
A replay attack _____. is considered to be a type of DoS attack makes a copy of the transmission for use at a later time replays the attack over and over to flood the server can be prevented by patching the web browser
makes a copy of the transmission for use at a later time
Which attack intercepts communications between a web browser and the underlying computer? replay man-in-the-browser (MITB) ARP poisoning man-in-the-middle (MITM)
man-in-the-browser (MITB)
Which type of mutation completely changes a virus from its original form by rewriting its own code whenever it is executed? metamorphic polymorphic oligomorphic betamorphic
metamorphic
Proving that a user sent an email message is known as _____. availability integrity non-repudiation repudiation
non-repudiation
Public key systems that generate random public keys that are different for each session are called _____. Elliptic Curve Diffie-Hellman (ECDH) Public Key Exchange (PKE) perfect forward secrecy Diffie-Hellman (DH)
perfect forward secrecy
What is data called that is to be encrypted by inputting it into a cryptographic algorithm? cleartext ciphertext plaintext opentext
plaintext
What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through three succeeding systems that all trust one another? cross-site attack transverse attack horizontal access attack privilege escalation
privilege escalation
Which of these is NOT a DoS attack? SYN flood smurf attack DNS amplification push flood
push flood
Which action cannot be performed through a successful SQL injection attack? display a list of customer telephone numbers reformat the web application server's hard drive erase a database table discover the names of different fields in a table
reformat the web application server's hard drive
Which of these is NOT a basic security protection for information that cryptography can provide? confidentiality authenticity risk loss integrity
risk loss
What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest? algorithm initialization vector (IV) salt nonce
salt
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? self-encrypting hard disk drives (SED) encrypted hardware-based USB devices Hardware Security Module (HSM) Trusted Platform Module (TPM)
self-encrypting hard disk drives (SED)
Which of these is a general term used for describing software that gathers information without the user's consent? gatherware spyware adware scrapeware
spyware
DNS poisoning _____. floods a DNS server with requests until it can no longer respond is rarely found today due to the use of host tables is the same as ARP poisoning substitutes DNS addresses so that the computer is automatically redirected to another device
substitutes DNS addresses so that the computer is automatically redirected to another device
A digital certificate associates _____. a private key with a digital signature the user's identity with his public key a user's private key with the public key a user's public key with his private key
the user's identity with his public key
Complete this definition of information security: That which protects the integrity, confidentiality, and availability of information _____. -on electronic digital devices and limited analog devices that can connect via the Internet or through a local area network -through a long-term process that results in ultimate security - through products, people, and procedures on the devices that store, manipulate, and transmit the information - using both open-sourced as well as supplier-sourced hardware and software that interacts appropriately with limited resources
through products, people, and procedures on the devices that store, manipulate, and transmit the information
What is the basis of an SQL injection attack? to expose SQL code so that it can be examined to link SQL servers into a botnet to have the SQL server attack client web browsers to insert SQL statements through unfiltered user input
to insert SQL statements through unfiltered user input
Digital certificates can be used for each of these EXCEPT _____. to verify the identity of clients and servers on the Web to encrypt messages for secure email communications to verify the authenticity of the Registration Authorizer to encrypt channels to provide secure communication between clients and servers
to verify the authenticity of the Registration Authorizer
Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide? verify the receiver enforce nonrepudiation verify the sender prove the integrity of the message
verify the receiver
Which type of malware requires a user to transport it from one computer to another? adware rootkit worm virus
virus