MCQ On Chapter 7 Part 2
MCQ On Chapter 7 Part 2
3- In …….. , the program writes more data to a buffer located on the stack than was
allocated for it
a- Stack buffer overflow
b- NOP sled attack
c- Heap overflow
d- Jump-to-register attack
4- ……… is a specific stack overflow attack where the attacker overflows the stack
with harmless NOP (no-op) instructions
a- Stack buffer overflow
b- NOP sled attack
c- Heap overflow
d- Jump-to-register attack
6- heap overflow attack will result in the corruption of other variables that are
already on the heap.
a- True
b- False
7- In ………………. the return pointer is overwritten with a value that will cause the
program to jump to a known pointer stored in a register that points to the input
buffer.
a- Stack buffer overflow
b- NOP sled attack
c- Heap overflow
d- Jump-to-register attack
11- Malware can delete or alter information and that is known as damage and
destruction of information
a- True
b- False
13- Denial if services means that malware can consume all available resources on a
target system, rendering it essentially useless for its intended use.
a- True
b- False
14- Malware can implant a bot onto a target system that allows an attacker to control
your system via remote control
a- True
b- False
16- …………….. are computer code fragments that attach themselves to a legitimate
program file on a computer
a- Viruses
b- Worms
c- Trojan horses
d- Rootkits
17- The virus can only run when the legitimate program is run.
a- True
b- False
18- viruses generally do not require human intervention to propagate
a- true
b- false
19- …….. is a type of virus
a- Master boot record
b- File infector virus
c- Macro virus
d- All of the mentioned
20- Viruses employ several methods to avoid detection by anti-virus programs. The
methods in use include:
a- Multipartite viruses
b- Stealth viruses
c- Polymorphic viruses
d- Encrypted viruses
e- All
21- ……………. Use some means to hide itself.
a- Multipartite viruses
b- Stealth viruses
c- Polymorphic viruses
d- Encrypted viruses
e- All
22- ……………. Can change themselves as they move from system to system in
order to avoid detection.
a- Multipartite viruses
b- Stealth viruses
c- Polymorphic viruses
d- Encrypted viruses
e- All
23- …………. Can encrypt most of their code, using a different key on each system
they infect, which makes most of the body of the virus different on each detected
system
a- Multipartite viruses
b- Stealth viruses
c- Polymorphic viruses
d- Encrypted viruses
e- All
24- Worms are like viruses but they usually require little human intervention to
spread.
a- True
b- False
27- . If port scanning worms is able to infect a new system, it will install itself and
begin the scanning to look for new victims.
a- True
b- False
32- With …………….. Rootkits can hide their own process(es) from users by altering
the tools that are used to list processes on a system
a- Process hiding
b- File hiding
c- Registry hiding
d- Running underneath the OS
33- With ………. Rootkits can hide registry entries in an attempt to function without
being detected
a- Process hiding
b- File hiding
c- Registry hiding
d- Running underneath the OS
34- ………… is the owner of the bot and it is used remotely control the infected
computer for a variety of progress.
a- Bot
b- Bot herder
c- Replying spam
d- None
35- ………………… is a technique that spam blockers use to block spam by blocking
all e-mail from specific IP addresses.
a- Replying spam
b- Hosting phishing sites
c- DOS
d- DDOS
36- Bot herders can launch ……………………. attacks from bot-controlled systems
by instructing those systems to launch thousands of network messages per
second to a target system.
a- Replying spam
b- Hosting phishing sites
c- DOS
d- DDOS
37- A bot herder can launch a ………………….. attack by directing hundreds,
thousands, or tens of thousands of bot-systems to attack the same target
simultaneously.
a- Replying spam
b- Hosting phishing sites
c- DOS
d- DDOS
38- Spam is unwanted e-mail
a- True
b- False
39- In …………. Attack an attacker directs all traffic destined for a particular web site
towards an imposter web site.
a- Phishing
b- Pharming
c- DOS
d- DDOS
40- In pharming, The attack diverts traffic by “poisoning” the organization’s DNS
servers or by changing the hosts file on individual users’ systems.
a- True
b- False
41- Spyware and adware encompass a wide variety of means that have been
developed to track the behavior of users’ Internet usage patterns
a- True
b- False
42- Spyware and adware take on many forms including
a- Tracking cookies
b- Web beacons
c- Browser helper objects
d- Key logger
e- All
43- A tracking cookies actually record a users’ keystrokes
a- True
b- False
44- web beacons are tiny 20 pixel images that are embedded in web pages as a
means for tracking users’ Internet usage.
a- True
b- False
“11 pixel”
45- Anti-viruses are found in many places in an organization as part of a defense in
depth
a- True
b- False
46- The places where anti-virus software can be found include:
a- End user workstation
b- E-mail servers
c- File servers
d- Web proxy servers
e- Security applicance
f- All
47- Security appliances perform several functions including firewall, web content filter
and anti-virus
a- True
b- False
48- ……………. Used techniques to find hidden processes, hidden registry entries,
unexpected kernel hooks, and hidden files in order to find rootkits that may be
present on a system
a- Anti-virus
b- Anti-rootkit
c- Anti-spyware
d- None
49- ……………… it monitors incoming files and examines them against a collection
of signatures, and blocks those files that match known signatures
a- Anti-virus
b- Anti-rootkit
c- Anti-spyware
d- None
50- ………….. is responsible for blocking the majority of the unwanted e-mail tht
carries malware, phishing scams and porn
a- Anti-virus
b- Anti-rootkit
c- Anti-spyware
d- Anti-spam
55- When malware successfully breaks into a system and is executed by the user,
the malware usually is executing with a different privilege level as the user.
a- True
b- False
“same instead of different ”
56- A side benefit of reducing user privileges to end user level is an increased
number of tech support calls to repair uh-oh’s, when often-inexperienced end
users muddle up operating system configurations.
a- True
b- False
“decrease number of tech support.”
57- Penetration testing often known as pen tests.
a- True
b- False
58- The object of penetration testing is to discover and fix vulnerabilities before a
hacker is able to discover and exploit them.
a- True
b- False
59- Server operating systems are very simple and often are pre-configured for a wide
variety of tasks.
a- True
b- False
“complex.”
60- ………………. Is designed to exploit weakness in the application by causing
unexpected behavior
a- Input attacks
b- Injection attacks
c- Malformed input attacks
d- All
61- With ……….. the attacker will input specially coded data in an attempt to cause a
malfunction that will result in the attacker having a higher level of access or
privilege in the application.
a- Elevation of privileges
b- Execution of arbitrary code
c- Malfunction
d- Abort
62- With ……………… The attacker may wish to run specific commands on the
target system.
a- Elevation of privileges
b- Execution of arbitrary code
c- Malfunction
d- Abort
63- With ……….. The attacker may wish to cause the application to malfunction and
be in a disabled state for legitimate users
a- Elevation of privileges
b- Execution of arbitrary code
c- Malfunction
d- Abort
64- With …………… The attacker may wish to cause the application to completely
abort and thus be unavailable for any legitimate use
a- Elevation of privileges
b- Execution of arbitrary code
c- Malfunction
d- Abort
65- …………. Is a type of input attacks.
a- Integer overflow
b- SQL injection
c- Script injection
d- Cross-site injection (XSS)
e- Cross-site request forgery (XSRF)
f- All
66- Script injection is similar to SQL injection.
a- True
b- False
67- In SQL injection, the attacker inserts specially coded and delimited SQL
statements into an input field in the hopes that the injected SQL will be executed
on the back end.
a- True
b- False
68- In SQL injection an attacker inserts script language into an input field in the
hopes that the scripting language will be executed.
a- True
b- False
69- cross-site scripting is an attack where an attacker can inject a malicious script
into HTML content in order to steal session cookies and other sensitive
information.
a- True
b- False
70- cross-site request forgery is an attack where malicious HTML is inserted into a
Web page or e-mail that, when clicked, causes an action to occur on an
unrelated site where the user may have an active session.
a- True
b- False
71- Measures that can be used to prevent input attacks include …..
a- Effective input field filtering
b- Application firewall
c- Application vulnerability scanning
d- Developer training
e- All
72- Logic bombs, sometimes known as time bombs
a- True
b- False
73- ………. are instructions deliberately placed in application code that perform some
hostile action when a predetermined condition is met.
a- Logic bombs
b- Input attacks
c- Backdoor
d- None
74- …………. consists of code that performs some damaging action on a date in the
distant future
a- Logic bombs
b- Input attacks
c- Backdoor
d- None
75- Logic bombs and back doors are very similar and both contained unwanted code
in an application.
a- True
b- False
76- The countermeasure for logic bomb
a- code reviews
b- source code control
c- source code scanning
d- third party assessments.
e- All
77- Many system resources are shared in multiprocessing systems that is known as
a- Logic bomb
b- Object reuse
c- Input attacks
d- None
78- Object reuse countermeasure consists of
a- Application isolation
b- Server virtualization
c- Developer trainer
d- All of the above
80- mobile code can be downloaded or transferred from one system for execution on
another system.
a- true
b- false
81- example of mobile code include
a- active website content
b- downloaded software
c- both
d- none of them
85- the purpose of a social engineering attack is to gain secrets from individuals that
can later be used to gain unauthorized access to the organization’s systems
a- true
b- false
89- Back doors can be difficult to find, particularly if they are inserted for disreputable
purposes
a- True
b- False
90- Routine functional testing and QA testing can always reveal back doors,
whatever their purpose
a- True
b- False