Info Assurance Chapter 7-11 Questions

Ace your homework & exams now with Quizwiz!

Chapter 11: Breanne's system was infected by malicious code after she installed an innocent-looking solitaire game that she downloaded from the Internet. What type of malware did she likely encounter?

Trojan Horse

A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword minus duplicates followed by the remaining letters of the alphabet.

True

In a chosen-ciphertext attack cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system.

True

The Data Link Layer of the OSI Reference Model is responsible for transmitting information on computers connected to the same local area network (LAN).

True

What is NOT one of the four main purposes of an attack?

Data import

Curtis is conducting an audit of an identity management system. Which question is NOT likely to be in the scope of his audit?

Does the firewall properly block unsolicited network connection attempts?

A packet-filtering firewall remembers information about the status of a network communication.

False

A physical courier delivering an asymmetric key is an example of in-band key exchange.

False

Another name for a border firewall is a DMZ firewall.

False

Chapter 10: A border router can provide enhanced features to internal networks and help keep subnet traffic separate.

False

Chapter 9: A private key cipher is also called an asymmetric key cipher.

False

Cryptographic key distribution is typically done by phone.

False

In a known-plaintext attack (KPA) the cryptanalyst has access only to a segment of encrypted data and has no choice as to what that data might be.

False

Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion alert each time that an administrator connects to a server using Secure Shell (SSH). What type of error is occurring?

False positive error

What is NOT a common motivation for attackers?

Fear

Adam discovers a virus on his system that is using encryption to modify itself. The virus escapes detection by signature-based antivirus software. What type of virus has he discovered?

Polymorphic virus

Chapter 8: Which data source comes first in the order of volatility when conducting a forensic investigation?

RAM

Gwen is investigating an attack. An intruder managed to take over the identity of a user who was legitimately logged into Gwen's company's website by manipulating Hypertext Transfer Protocol (HTTP) headers. Which type of attack likely took place?

Session hijacking

The CEO of Kelly's company recently fell victim to an attack. The attackers sent the CEO an email informing him that his company was being sued and he needed to view a subpoena at a court website. When visiting the website malicious code was downloaded onto the CEO's computer. What type of attack took place?

Spear phishing

Joe is responsible for the security of the industrial control systems for a power plant. What type of environment does Joe administer?

Supervisory Control and Data Acquisition (SCADA)

Chapter 7: What is NOT generally a section in an audit report?

System Configurations


Related study sets

Speech 1315 Check Up Quizzes 1-21

View Set

The Constitution of the Republic of the Philippines

View Set

Combo with "Combo E-Commerce Exam 2" and 27 others

View Set

Unit 5: Methods of Transferring Title

View Set

Ch. 14 The Brain Connect Assignments

View Set

Aplia 3.1 formal and informal fallacies

View Set

Maryland Motorcycle Learners Permit Test

View Set

UIL Social Studies 2023-2024: Related Terms

View Set