MIS399 EXAM QUIZ

  1. A __________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media.  Network sniffer
  2. a birthday attack is a type of logic bomb virus that releases its payload on some famous persons birthday   false
  3. A fail-secure lock is unlocked in a power interruption.  False
  4. A mantrap is used to combat tailgaiting   True
  5. A NIDS signature database is much larger than a HIDS system   True
  6. A person’s weight is a biological factor that can be used for authentication   False
  7. A port number is a way to identify a specific computer to which an Internet or other network message is to be forwarded.  FALSE
  8. A protocol defines a number of agreed-upon parameters, such as the data compression method, the type of error checking to use, and mechanisms for systems to signal when they have finished either receiving or transmitting data.  True
  9. A security professional must understand how the various TCP/IP protocols operate.  True
  10. Access tokens are defined as something you know   False
  11. another term for defense in depth is layered security   True
  12. Besides physically securing access to your computers you can do very little to prevent drive imaging   True
  13. Besides physically securing access to your computers, you can do very little to prevent drive imaging.  False
  14. Context-based signatures match a pattern of activity based on the other activity around it such as a port scan   True
  15. Encapsulation is the concept of separating items so that they cannot interfere with each other.  False
  16. Hostile activity that does not match an IDS signature and goes undetected is called a false positive     False
  17. Implicit deny applies to situations involving both authorization and access   true
  18. In a __________ attack, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all systems on that network.  Smurf
  19. In most security circles, security through obscurity is considered a good approach, especially if it is the only approach to security.  False
  20. In terms of physical security, which term refers to protecting important assets by using multiple perimeters?  Layered access
  21. Ip address main rule    Can not exceed 255
  22. Johnny receives a “new version” of the game Solitaire in an e-mail. After running the program, a backdoor is installed on his computer without his knowledge. What kind of an attack is this?  Trojan
  23. layered access is a form of defense in depth   True
  24. Making data look like it came from a different source is called   Spoofing
  25. Most networks are dominated by Ethernet/internet protocol   TRUE
  26. OSI model   Please Do Not Throw Sausage Pizza Away
  27. Packet fragmentation is the splitting of a packet while in transit into two packets so that they can get past an MTU bottleneck.  True
  28. RST gracefully terminates the connection and FIN abruptly tells the other side to stop communicating.  False flip it
  29. Size of MAC Address   12 Hex numbers expresses as:

    00:07:e9:c8:ff:00
  30. Switches are essentially small computers that perform a variety of intelligent tasks.  False
  31. SYN flooding is an example of a __________.  DOS attack
  32. TCP is a connectionless protocol   FALSE
  33. The gateway address (or default gateway) is a switch interface connected to the local network that sends packets out of the local network.  False
  34. the misuse detection model is more difficult to implement than the anomaly detection model  False
  35. The ping of death is a type of MITM attack   False
  36. The primary defense against a majority of physical attacks are walls, fences, gates, and doors.   True
  37. The term __________ refers to software that has been designed for some nefarious purpose.  Malware
  38. Three-Way handshacke   1. SYN
    2.SYN/ACK
    3.ACK
  39. To which distinct areas do physical security policies and procedures relate   Computers and users
  40. Traffic that is encrypted will typically pass by an intrusion prevention system  True
  41. UDP uses a three-way handshake to establish connections.   False
  42. What is an advantage of a host-based IDS   It can reduce false-positive rates
  43. What is an advantage of a network based IDS   Fewer systems
  44. What is one difference between the misuse and anomaly IDS models?  Anomaly models require knowledge of normal activity, whereas misuse models do not.
  45. What is one of the most fundamental principals in security   Least privilege
  46. What relies on lies and misrepresentation, which an attacker uses to trick an authorized user into providing information or access the attacker would not normally be entitled to.  Social engineering
  47. What security design principle states that secrecy itself cannot be relied upon as a means of protection?  Open Design
  48. What term refers to a piece of code that sits dormant for a period of time until some event invokes its malicious payload?  Logic Bomb
  49. What type of software records and reports on activates   Spyware
  50. Which component of an IDS examines the collected network traffic and compares it to known patterns of suspicious or malicious activity stored in the signature database?  Analysis Engine
  51. Which security concept uses the approach of protecting something by hiding it?  Security Through Obscurity
  52. Which security principal states that if you have not specifically been allowed access then it should be denied?  Implicit Deny
  53. Which security principle is characterized by the use of multiple, different def mechanisms with a goal of improving defensive response to an attack  Defense in depth
  54. Which security principle is described as always using simple solutions when available   Economy of mechanism
  55. Which security principle refers to the concept that each and every request should be verified?  Complete Mediation
  56. Which security principle states that access should be based on more than one item?  Separation of privilege
  57. Which statement accurately summarizes the “security problem”?  physical access negates all other security measures
  58. Which statement describes the main difference between TCP and UDP packets?  TCP packets care connection oriented & UDP packets are connectionless
  59. Which term defines a collection of predefined activity patterns that have already been identified and categorizd  Signature database
  60. Which term describes an operating system distribution specifically designed to run the entire machine from an optical disc without using the hard drive?  LiveCD
  61. Which term is used when separation of privilege is applied to people   Separation of duties
  62. Which term refers to a form of malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality?  Rootkit
  63. Which term refers to a repository of alarms that an IDS has recorded?  Alarm storage
  64. Which term refers to any media used to boot a computer into an operating system (OS) that is not the native OS on its hard drive?  Bootdisk
  65. Which term refers to invocation of conditions that fall outside the normal sequence of operation  Fail-safe defaults
  66. Which term refers to making different layers of security dissimilar so that an attacker can not get through all of them   Diversity of defense
  67. Which tool has been the de facto standard IDS engine since its creation in 1998?  SNORT

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *