Quiz 2 infa 610 foundations of information security and assurance


I have complete test bank for this class quiz message me for testbank


Name_________________________                                    Date____________________

·      There are 30 questions in this Quiz and each question is worth 2 points

·      The quiz is worth 10% of your final grade for the course.

·      For multiple choices, circle the option that best answers the question. For True/False, put either a T or F next to the question. For Fill in the blank choose your answer

·      Please provide your answers in the Answer Table below.

·      The quiz is due on Sunday November 1, 11:59 US EDT. Early submission is encouraged and is welcomed. There will be a 20% penalty for every day late (less than or equal 24 hours is considered a day) until no points are left.

·      The quiz is to be of your own work and no other individuals may assist you in this effort.

·      When applicable please provide your own examples to complement your material.

·      Please put your name & date at the top of the document and name your file using this file naming convention: fLastQuiz2.doc, e.g. the Quiz 1 file name for me would be aGhafarianQuiz1.doc

·      Please submit your work using the Quiz1 link in the Assignment area of LEO.

·      Use Cybercafé to post your questions about the Quiz but no questions about the questions themselves.



1.     Malicious software aims to trick users into revealing sensitive personal data.

2.     Keyware captures keystrokes on a compromised system.

3.     The buffer overflow type of attack is one of the least commonly seen attacks

4.     Several of the items in the CWE/SANS Top 25 Most Dangerous Software Errors list, Risky Resource Management category, are buffer overflow variants.

5.     Security flaws occur as a consequence of sufficient checking and validation of data and error codes in programs.

6.     A difference between defensive programming and normal practices is that everything is assumed.

7.     It is possible for a system to be compromised during the installation process.

8.     Ideally new systems should be constructed on an unprotected network in order to prevent installation restrictions.


9.     A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim’s data is __________.

a.     Adobe

b.     Animoto

c.     malware

d.     Prezi


10.  A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.

a.     logic bomb

b.     trapdoor

c.     worm

d.     Trojan horse


11.  A _______ can occur as a result of a programming error when a process attempts to      store data beyond the limits of a fixed-size buffer.

a.     shellcode

b.     program overflow

c.     buffer overflow

d.     library function


12.  A ______ is a structure where data are usually saved on the stack.

a.     guard page

b.     stack frame

c.     heap

d.     NOP sled


13.  _________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.

a.     PHP attack

b.     Format string injection attack

c.     XSS  attack.

d.     Injection attack


14.  A _______ attack is where the input includes code that is then executed by the attacked system.

a.     SQL injection

b.     cross-site scripting

c.     code injection

d.     interpreter injection



15.  The first step in deploying new systems is _________.

a.     security testing

b.     installing patches

c.     planning

d.     secure critical content


16.  Which of the following need to be taken into consideration during the system  security planning process?

a.     how users are authenticated

b.     the categories of users of the system

c.     what access the system has to information stored on other hosts

d.     all of the above



17.  A _________ is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence of its presence.


18.  A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.


19.  The function of the _______ was to transfer control to a user command line interpreter that gave access to any program available on the system with the privileges of the attacked program.


20.  One of the restrictions on the content of shellcode is that it has to be _______, which means that it cannot contain any absolute address referring to itself.


21.  Two key areas of concern for any input are the _______ of the input and the meaning and interpretation of the input.


22.  A number of widely used standard C _________ compound the problem of buffer overflow by not providing any means of limiting the amount of data transferred to the space available in the buffer.


23.  System security begins with the installation of the ________.


24.  The final step in the process of initially securing the base operating system is ________.


25.  ______ is a reactive control that can only inform you about bad things that have already happened.



Answer Table




















































Short Answer

26.  What are three broad mechanisms that malware can use to propagate?

27.  What are four broad categories of payloads that malware may carry?

28.  How does behavior- blocking software work?

29.  What is a digital immune system?

30.  There is a flaw in the virus program of Figure 6.1 . What is it?





The post Quiz 2 infa 610 foundations of information security and assurance appeared first on Australia Assessments.


Source link

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Chat with us on WhatsApp