CIT 480 MIDTERM EXAM QUESTIONS
WITH CORRECT ANSWERS
Threat |- |CORRECT |ANSWER✔✔-People |who |are |able |to |take |advantage |of |security |
vulnerabilities |to |attack |a |system.
Attack |- |CORRECT |ANSWER✔✔-Tools, |programs, |and |methods |used |by |threats |to |obtain |assets
|from |systems |in |violation |of |the |security |policy.
Virus |- |CORRECT |ANSWER✔✔-A |computing |virus |is |type |of |malware |that, |when |executed, |
replicates |by |inserting |copies |if |itself |into |other |files.
Botnet |- |CORRECT |ANSWER✔✔-A |network |of |compromised |machines |that |can |be |controlled |
remotely |used |for |malicious |activity.
Buffer |Overflow |- |CORRECT |ANSWER✔✔-Occurs |when |too |much |input |is |accepted |and |is |
stored |in |a |fixed |length |buffer |that's |too |small, |overwriting |the |contents |of |memory |after |the |
buffer.
Type |of |what?
Bob |uses |a |network |sniffer |to |view |what |Alice |is |typing |in |her |telnet |connection |on |a |router. |- |
CORRECT |ANSWER✔✔-Confidentiality: |Bob |observes |Alice's |key |strokes
Type |of |what?
Mallory |broadcasts |spoofed |ARP |responses |resulting |in |computers |in |the |subnet |having |
incorrect |mappings |of |IP |address |to |MAC |address. |- |CORRECT |ANSWER✔✔-Integrity: |Mallory |
has |poisined |ARP |caches |with |fake |data
Type |of |what?
WITH CORRECT ANSWERS
Threat |- |CORRECT |ANSWER✔✔-People |who |are |able |to |take |advantage |of |security |
vulnerabilities |to |attack |a |system.
Attack |- |CORRECT |ANSWER✔✔-Tools, |programs, |and |methods |used |by |threats |to |obtain |assets
|from |systems |in |violation |of |the |security |policy.
Virus |- |CORRECT |ANSWER✔✔-A |computing |virus |is |type |of |malware |that, |when |executed, |
replicates |by |inserting |copies |if |itself |into |other |files.
Botnet |- |CORRECT |ANSWER✔✔-A |network |of |compromised |machines |that |can |be |controlled |
remotely |used |for |malicious |activity.
Buffer |Overflow |- |CORRECT |ANSWER✔✔-Occurs |when |too |much |input |is |accepted |and |is |
stored |in |a |fixed |length |buffer |that's |too |small, |overwriting |the |contents |of |memory |after |the |
buffer.
Type |of |what?
Bob |uses |a |network |sniffer |to |view |what |Alice |is |typing |in |her |telnet |connection |on |a |router. |- |
CORRECT |ANSWER✔✔-Confidentiality: |Bob |observes |Alice's |key |strokes
Type |of |what?
Mallory |broadcasts |spoofed |ARP |responses |resulting |in |computers |in |the |subnet |having |
incorrect |mappings |of |IP |address |to |MAC |address. |- |CORRECT |ANSWER✔✔-Integrity: |Mallory |
has |poisined |ARP |caches |with |fake |data
Type |of |what?