100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

INTRO TO COMPUTER SECURITY 2025 MIDTERM REVISION QUESTIONS WITH VERIFIED ANSWERS

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
01-05-2025
Written in
2024/2025

INTRO TO COMPUTER SECURITY 2025 MIDTERM REVISION QUESTIONS WITH VERIFIED ANSWERS A ___________ is a type of malicious code that performs some system-damaging action when a specific condition occurs. - ANSWER-logic bomb A common approach for creating polymorphic viruses uses encryption technology. - ANSWER-true A is a set of instructions designed to bypass the normal authentication mechanism and allow access to the system to anyone who knows the vulnerability exists - ANSWER-back door A logic bomb is malware that is set to go off when a particular system event occurs, such as a particular date and time. - ANSWER-true A loss of ________ is the unauthorized disclosure of information. - ANSWER-confidentiality A program with both an expected and unexpected effect is a __________. - ANSWER-trojan horse A sender not being able to deny sending a message that he/she, in fact, did send, is known as message ___________. - ANSWER-non-repudiation A threat can be defined as a ____________. - ANSWER-set of circumstances that could cause harm or loss Address Space Layout Randomization (ASLR) is a protection mechanism implemented to prevent buffer overflows at what level of computer systems? - ANSWER-OS Amy changing the amount on Bill's check from $100 to $1,000 is a violation of which computer security property? - ANSWER-integrity Amy secretly copying Bill's homework is a violation of which computer security property? - ANSWER-confidentiality An access control system that grants users only those rights necessary for them to perform their work is operating on which security principle? - ANSWER-least privilege An advantage of behavior-base protection over signature-based protection is that they are likely to have a lower false positive rate. - ANSWER-true An advantage of behavior-base protection over signature-based protection is the ability to potentially detect novel attacks. T/F - ANSWER-true An exploited utilizing a buffer overflow in Microsoft's IIS web server (for which a patch had been available for a month) that infected 250,000 systems in nine hours. - ANSWER-Code Red worm An object (usually a 1x1 pixel transparent image) embedded in a web page, which is fetched from a different server from the one that served the web page itself allowing a third party to gather information about you without your knowledge or consent. - ANSWER-web bug Bill using a denial of service attack (DoS) to crash Amy's operating system is a violation of which computer security property? - ANSWER-availability Client-side mediation is an effective way for web sites to validate user input and maintain the client-side state. - ANSWER-false Computer viruses, worms, and Trojan horses are classified as __________, which are programs that act without a user's knowledge and deliberately alter the computer's operations. - ANSWER-malware CryptoLocker is considered what type of malware? - ANSWER-ransomware Given the following listing from a Linux operating system, what access rights does the user jane have to thefile? -r---w---x 1 jane staff thefile - ANSWER-read only How a virus spreads can be completely independent of the payload it executes on each system it infects. - ANSWER-true In Linux operating systems, what does setuid do and why is it considered dangerous? - ANSWER-It changes the permissions of a process to be the permissions of the owner of the program rather than those of the user. This is dangerous because if the process can be hijacked, then the user has all of the owner's permissions. Integrity- Availability- Confidentiality- - ANSWER-Detecting unauthorized or unintentional changes to data Insuring that information is accessible within a reasonable expectation of time Preventing the unauthorized access of information Malware focused on Middle Eastern countries' energy sectors using cyber espionage to collect sensitive information such as taking screenshots, sniffing network passwords, and recording Skype conversations. - ANSWER-flame Malware targeting Siemens SCADA systems installed on Windows affecting functions such as the application of the operation of centrifuges allegedly created by the US and Israeli intelligence agencies targeting the Iranian uranium enrichment program. - ANSWER-stuxnet Malware that requires user actions to spread is more likely to be a virus than a worm. - ANSWER-true One way to implement the ________ design principle for security is to "always validate inputs". - ANSWER-complete mediation The first Internet worm, launched by a graduate student at Cornell in 1988 - ANSWER -morris worm The following are typical characteristics of a computer virus except ______. - ANSWER-self-propagate The purpose for putting a "canary" value in the stack is to detect _________. - ANSWER-a stack smashing attack Viruses can spread to systems even if they have no Internet connectivity. - ANSWER-true Which of the following best describes the term "asset" in the context of computer security? - ANSWER-anything that has value to the org Which of the following terms best describes the assurance that data has not been changed unintentionally due to an accident or malice? - ANSWER-integrity Which of the following terms best describes the weakness in a system that may possibly be exploited? - ANSWER-vulnerability

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
May 1, 2025
Number of pages
6
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

INTRO TO COMPUTER SECURITY 2025 MIDTERM
REVISION QUESTIONS WITH VERIFIED ANSWERS



A ___________ is a type of malicious code that performs some
system-damaging action when a specific condition occurs. -
ANSWER-logic bomb



A common approach for creating polymorphic viruses uses
encryption technology. - ANSWER-true



A is a set of instructions designed to bypass the normal
authentication mechanism and allow access to the system to
anyone who knows the vulnerability exists - ANSWER-back door



A logic bomb is malware that is set to go off when a particular
system event occurs, such as a particular date and time. -
ANSWER-true



A loss of ________ is the unauthorized disclosure of information. -
ANSWER-confidentiality



A program with both an expected and unexpected effect is a
__________. - ANSWER-trojan horse

, A sender not being able to deny sending a message that he/she, in
fact, did send, is known as message ___________. -
ANSWER-non-repudiation



A threat can be defined as a ____________. - ANSWER-set of
circumstances that could cause harm or loss



Address Space Layout Randomization (ASLR) is a protection
mechanism implemented to prevent buffer overflows at what level
of computer systems? - ANSWER-OS



Amy changing the amount on Bill's check from $100 to $1,000 is a
violation of which computer security property? - ANSWER-integrity



Amy secretly copying Bill's homework is a violation of which
computer security property? - ANSWER-confidentiality



An access control system that grants users only those rights
necessary for them to perform their work is operating on which
security principle? - ANSWER-least privilege



An advantage of behavior-base protection over signature-based
protection is that they are likely to have a lower false positive rate.
- ANSWER-true
£5.42
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
PERFECTSCHOOLERS
1.0
(1)

Get to know the seller

Seller avatar
PERFECTSCHOOLERS Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
1 year
Number of followers
0
Documents
156
Last sold
6 months ago
PERFECTSCHOOLERS

"Dedicated to providing high-quality study materials to help students succeed. In order to facilitate and expedite learning, we distribute notes, guides, and resources on a range of topics. Join us for study tips and content designed to boost your grades!"

1.0

1 reviews

5
0
4
0
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions