MCQ, Saq, Laq Infosec
MCQ, Saq, Laq Infosec
Indirect DoS Attack: The attacker’s IP address is spoofed (i.e., faked) and the attack
appears to come from another computer
3. Total cost of incident (TCI): exporsure factor in classic risk analysis assumes
that a percentage of the asset is lost. In most cases, damage doesn’t come from
asset lost.
1. What’s Cryptography
Cryptography is the use of mathematical operations to protect messages
traveling between parties or stored on a computer. CIA in cryptography:
Confidentiality means that someone intercepting your communications
can’t read them >> 1 cryptographic protection.
Integrity: message can’t be changed; if it’s changed, this change will be
detected.
Authentication: proving one’s identity to another so they can trust you
more.
Week 5 - Chapter 3
Symmetric Key encryption refers to the process where two parties have the same key to
encrypt communication between each other (ONE single key is used to encrypt and decrypt in
both directions) >> Fast
Public key encryption involves a public key for encryption and a private key for decryption >>
Slow
3. What is Keying?
Keying refers to the process of encrypting a symmetric key using a public key and sending it so
that only the given persons private key can receive the symmetric key.
4. What is Hashing?
Goal: To show the supplicant knows the true party’s private key
Step 2: Verify the digital signature using the true parties public key
7. What is a MAC?
Stage 3: Keying Stage where keys are exchanged for establishing communication
2 – SHA-1
3 – MD5
>> Note: MD5 and SHA-1 should not be used because they have been shown to be unsecure
The supplicant wishes to prove his identity and the verifier tests the credentials then accepts or
rejects the supplicant.
This is usually done by the server sending a challenge message that the client needs to hash.
Once the client hash’s the message they send it back to the server and then the server
validates if the hashes match. The supplicant also sends a password in the same response
containing the hash that the server will use for ongoing communications.
The ongoing communication stage uses message by message encryption AND message by
message authentication leaving no room for someone to expose that line of messaging.
It means that the sender cannot deny that they sent the message.
Is HMAC non-repudiable?
No, HMAC can be repudiated since both parties possess the HMAC. The sender can claim that
the receiver created the message.
It’s an attack where a message is captured and then retransmitted at a later time. Even if the
attacker cant read/decrypt the message it can still be used later.
Time stamps, Sequence numbers, Nonces (randomly generated numbers placed in front of
messages) can be used to combat it.
17. Explain the difference between Digital Signatures and Digital Certificates:
Digital Certificates provide a true party’s name and public key, Digital Signatures are appended
to messages to verify a messages authenticity. (Note: Digital Certificates contain digital
signatures from the Certificate Authority (CA))
18. How do you verify a Digital Certificate?
By testing the digital signature using the CA’s public key, checking the valid period of the
certificate and checking the certificate for revocation.
19. What does VPN stand for, what does it mean and what are the 3 types of VPN?
It stands for Virtual Private Network, a cryptographic system that is used to establish secure
communication on an untrusted network. The three types are Host to Host VPN, Remote
Access VPN and Site to Site VPN.
Transport (host to host) (this is costly to setup) and Tunnel (site to site).
Week 7 – Chapter 4
· Attackers can access communication channels that were previously considered closed and
confidential.
2 - What are the four goals of creating a secure network
· Availability – ensuring users have access to information services and network resources
· Access Control – Keeping attackers or unauthorized users from accessing internal resources
Its is a defense architecture that has a focus on the good guys being on the inside while the bad
guys are on the outside and being guarded against.
In a city model no distinct perimeter is set and there are multiple ways of entering the network.
Your authentication determines which “buildings” you can access
DoS Denial of Service attack refers to an attack where theres an attempt to make a
server/network unusable to legitimate users by flooding it with traffic.
In indirect DOS the attacker’s ip is spoofed and the attack appears to come from another
computer.
The Smurf attack utilizes the Internet Control Message Protocol (ICMP) to send a large number
of echo requests ("pings") to a network's broadcast address, all having a spoofed source
address of the victim.
The SYN flood attack exploits the TCP handshake process. The attacker rapidly sends TCP
connection requests (SYN packets) but does not complete the handshake with the final
acknowledgment (ACK).
It’s an attack where the attacker redirects legitimate network traffic to the victim rendering their
computer useless. The hosts believe that the server they are communicating with is at the
redirected ip when in reality it’s a victim.
Black holing : Is a defense method where all ip packets are dropped from the attacker, it
generally isn’t a good long term solution since the attackers can change their ip address. It can
also fail if the attacker spoofs a known corporate ip which still causes a DoS.
Validating TCP handshake: We make the firewall itself send back the SYN/ACK segment
without passing the SYN segment into the target server. When the firewall gets a legitimate
ACK then it sends it to the server.
Rate limiting: This can be used to reduce a certain type of traffic to stop the server from being
overwhelmed. It can be an inconvenience to attackers AND legitimate users.
ARP (Address Resolution Protocol) poisoning is a network attack that manipulates host ARP
tables to reroute to local-area network traffic. It requires an attacker to have a computer on the
LAN and its an attack on both functionality and confidentiality.
ARP requests and replies don’t require authentication or verification. By ARP spoofing the
attacker can use false ARP replies to map any Ip address to any MAC address so all the
attacker has to do is send continuous streams of unsolicited ARP replies.
Refers to the process of connecting to an access point wirelessly via a wireless client (phone).
The access point is directly connected to the switch which is connected to the gateway.
19 - Whats the difference between open network, private network and secured network?
Open networks can be legally accessed by anybody (café wifi), private networks are only
accessible to people with permissions (home wifi) and secured networks are networks that have
security protocols installed in them that require authentication and the wireless traffic in them is
encrypted.
With an evil twin access point, the attacker manages to tap into the victims wireless client and
send their own attacks while impersonating the victims Wi-Fi signal. Hence the name “Evil Twin”
since the connections seem identical from the access points perspective.
Access Controls refers to the concept of limiting access to physical and electronic resources.
The limitations are usually policy-driven.
6 - Explain Mandatory and Discrentionary access control, as well as the difference between
the two:
Mandatory access control (MAC) has no ability to alter controls set by higher authorities,
Discretionary AC (DAC) has a departmental/personal ability to alter access controls set by
higher authorities.
MAC is more secure but much more difficult to implement than DAC.
Data is classified into different sections when it comes to multilevel security, depending on how
sensitive the data is the access level is restricted to a similar level. For example data classified
as public may have no access restrictions while data classified as top secret can only be
accessed by the CSO & CEO of a company.
This concept can be applied to people as well for clearance level.
False acceptance rates refer to the percentage of people who are verified to match a template
when they shouldn’t be, False rejection rate refers to the percentage of people who should
match the template but are not.
10 - Explain the difference between authentication and identification in terms of biometric
validation.
In biometric authentication the system compares the entered data to ONE template which is the
claimed identity. In biometric identification, the system checks the entered data along across
ALL templates to find a matching one identifying the individual.
Deception refers to a subject attempting to fool the system. Deception is intentional since
someone is actively trying to fool the system while errors occur naturally.
Week 8 – Chapter 6
The firewall acts as a border between the internet and an internal network. It filters out attack
packets by dropping and logging them while allowing other packets it deems as safe to pass on
to the network.
· Firewalls cannot filter all the traffic passing through them, if it cant process a packet it drops it
meaning that the packet has a possibility of not being an attack.
3 - When creating a firewall capacity what is something that must be kept in mind?
· Firewalls must be able to handle all incoming traffic volumes at wire speed (maximum speed)
Static Packet Filtering is a firewall filtering mechanism that inspects one packet at a time while
only looking at some internet and transport headers. It is unable to stop many types of attacks.
Static packet filtering can stop ICMP Echo packets, outgoing responses to scanning probe
packets, packets with spoofed ip addresses, invalid packets with suspicious parameters.
5 - What is SPI?
Stateful Packet Inspection (SPI) is another firewall filtering mechanism that keeps track of the
state of a packet. Depending on the packets stage/state different filtering rules are applied to it
for example, a packet attempting to begin a connection will be given more restrictions than a
packet that has already established a connection.
6 - What’s an ACL?
ACL is an access control list usually within an SPI firewall that manages a series of rules for
allowing or disallowing connections.
The rules execute in an orderly manner where if a rule doesn’t apply till check the next but if it
does then the connection is allowed without checking the other rules. If no rules fit the criteria
then the final rule is executed (usually default behaviour)
It’s a firewall filtering mechanism operating on the application layer that is responsible for
filtering out attack packets from communication traffic between a client and webserver. The
proxy serves as a protection layer to the webserver/client from attacks.
The key difference is the level at which the filtering process occurs, application proxies process
on the application layer while SPI occurs on the transport layer.
9 - What are some protections that APF offers?
· Protection for internal clients against malicious webservers (Url blacklists, scripts in webpages)
· Protection for internal webservers against malicious clients (Disallowing post methods or sql
injection)
· Automatic Protections such as Header destruction, hiding of internal host ip addresses from
sniffers and protocol fidelity (Connections diverting from protocol are immediately broken down)
10 - What’s an IDS?
An IDS is an Intrusion Detection System that is typically used to detect and log suspicious
traffic. It can send out an alarm if the attack appears to be serious.
11 - What’s an IPS?
Its an intrusion prevention system, it’s a filtering mechanism that halts packets it deems as
attacks.
Unlike an IDS it wont only observe an attack, instead it stops the attack from occurring in the
first place allowing it to manage risks. It does this by dropping packets or placing bandwith
limitations to certain types of traffic.
12 - What’s UTM?
UTM means Unified Threat Management, it a system that goes beyond a traditional firewall by
combining different security measures such as SPI, VPNS, Antiviruses, etc…
13 - Whats a DMZ?
Demilitarized Zone , it’s a subnet network for servers/application proxy firewalls accessible to
the outside world that acts as a border between the internet and internal network. This provides
an extra layer of security that isn’t exposed to attackers directly. DMZ’s are even more hardened
since they are at more risk of being attacked.
Chapter 6
More:
36. Discuss the importance of prioritizing patches and the risks involved in patch installation.
o Answer: Prioritizing patches is important because it allows organizations
to address the most critical vulnerabilities first, reducing the risk of
exploitation. However, patch installation can introduce new risks, such as
system incompatibilities or the introduction of new vulnerabilities, which is
why each patch must be carefully evaluated and tested before deployment.
37. Explain why it is necessary to restrict physical access to hosts as part of the host
hardening process.
o Answer: Restricting physical access to hosts is necessary to prevent
unauthorized individuals from gaining direct access to the systems, where
they could potentially bypass network security measures, install malicious
software, or steal sensitive information.
38. Elaborate on the steps that should be taken to protect notebook computers from theft
and data loss.
o Answer: Protecting notebook computers from theft and data loss involves
implementing several measures such as using strong passwords,
encrypting sensitive data, regularly backing up data, and possibly using
physical security devices such as cable locks. Additionally, implementing
policies to limit the storage of sensitive data on portable devices can
further mitigate the risk.
39. How does virtualization contribute to reduced labor costs in managing IT infrastructure?
o Answer: Virtualization contributes to reduced labor costs by allowing
multiple virtual machines to run on a single physical server, simplifying
management tasks, improving resource utilization, and streamlining the
deployment of applications and services, which reduces the time and
personnel needed for these operations.
40. What are the benefits and potential drawbacks of automatic updates for security
patches?
o Answer: The benefits of automatic updates include timely application of
security patches, reduced risk of human error, and reduced administrative
overhead. Potential drawbacks could be the unexpected introduction of
incompatibilities, system instability, or the automatic application of flawed
updates that might require rollback or additional intervention.
Chapter 8
Short-Answer Questions:
Long-Answer Questions:
1. Explain the process and dangers of a buffer overflow attack in the context of
application security.
o Answer: A buffer overflow occurs when a program writes more data to a block of
memory, or buffer, than it is allocated to hold. This excess data can overwrite
adjacent memory locations and can be exploited to execute arbitrary code,
potentially giving an attacker control over the affected system. Buffer overflow
attacks are dangerous because they can lead to unauthorized access, data
corruption, system crashes, and the potential compromise of system integrity and
security.
2. Discuss the measures that can be taken to secure an e-commerce platform
against common web attacks.
o Answer: To secure an e-commerce platform, one should implement several
measures:
Use secure coding practices to mitigate SQL injection, XSS, and other
injection attacks.
Regularly update and patch all software components, including third-party
plugins.
Employ firewalls and intrusion detection systems to monitor and block
malicious traffic.
Use HTTPS to encrypt data in transit and ensure data integrity.
Perform regular security audits and vulnerability assessments to identify
and fix potential security gaps.
Educate employees and users about security best practices.
3. Describe how a SQL injection can be carried out and what steps can be taken to
prevent it.
o Answer: A SQL injection is carried out by an attacker who inputs malicious SQL
code into an application’s input fields, which is then passed to and executed by
the database. This can be used to read, modify, or delete data. To prevent SQL
injections, developers should use prepared statements and parameterized
queries, which separate SQL logic from data. Validating and sanitizing all user
inputs to ensure they do not contain SQL code is also critical, as is implementing
least privilege access controls on the database.
4. Explain the concept of 'dancing pigs' and how it relates to user behavior in
cybersecurity.
o Answer: The 'dancing pigs' concept, coined by Edward Felten, highlights a
cybersecurity phenomenon where users are more likely to choose a gratifying or
entertaining experience over secure practices. This tendency can lead to risky
behavior, such as downloading unsafe applications or clicking on dubious links,
thus compromising security. It underscores the importance of designing secure
systems that also cater to user engagement without compromising security.
5. Detail the importance of content filtering in email security and the potential
downsides of aggressive filtering.
o Answer: Content filtering in email security is important because it helps to
prevent unwanted content, such as spam, phishing attempts, and malware-
infected attachments, from reaching users' inboxes. This can protect users from
fraud and the organization from data breaches. However, overly aggressive
filtering can lead to false positives, where legitimate emails are incorrectly
flagged as malicious, which can disrupt business communications and lead to
missed opportunities.
Short-Answer Questions:
6. What does the term 'sandbox' mean in the context of client-side scripting?
o Answer: A 'sandbox' is a security mechanism that runs code in a restricted
environment. It limits the program's access to the system's files and resources to
prevent potential damage or compromise to the system.
7. Why is it dangerous for an application to have superuser privileges?
o Answer: If an application with superuser privileges is compromised, the attacker
can potentially gain full control over the system, leading to significant security
breaches including data theft, data corruption, and unauthorized access to
system resources.
8. What is the significance of the 'dancing pigs' quote by Edward Felten?
o Answer: The quote signifies that users often prioritize entertainment or
convenience over security measures, which can lead to risky behaviors and
potential security breaches.
9. What is an unintended consequence of aggressive spam filtering?
o Answer: Aggressive spam filtering can result in legitimate emails being
incorrectly marked as spam, known as false positives, which may cause
important communications to be missed or delayed.
10. What is the risk associated with automatic redirection to unwanted webpages?
o Answer: Automatic redirection can lead users to malicious sites where they may
be exposed to phishing attacks, malware, or scams.
Long-Answer Questions:
6. Discuss the risks and security measures associated with client-side scripting in
web browsers.
o Answer: Client-side scripting can enhance user experience but also poses
security risks. Malicious scripts can access user data, manipulate web pages, or
redirect users to harmful sites. Security measures include running scripts in a
sandboxed environment, implementing Content Security Policy (CSP), validating
and sanitizing all inputs, and using up-to-date antivirus software to detect and
block malicious scripts.
7. Describe the concept of 'social engineering' in the context of malicious links.
o Answer: Social engineering in the context of malicious links involves
manipulating individuals into performing actions or divulging confidential
information. Attackers use psychological manipulation to trick users into clicking
on malicious links that may lead to malware infections, data breaches, or fraud.
This can be countered by user education, vigilance, and employing anti-phishing
tools.
8. How do cookies enhance user experience, and what privacy concerns do they
raise?
o Answer: Cookies enhance user experience by storing user preferences, session
information, and tracking user behavior for personalized content. However, they
raise privacy concerns as they can track users across multiple sites, potentially
leading to invasive profiling and unauthorized sharing of personal data.
9. Explain the importance of employee training in maintaining email security.
o Answer: Employee training is vital for email security as it educates users on
identifying and properly handling potential threats like phishing, malware, and
social engineering. It also emphasizes the best practices for sending and
receiving emails, ensuring sensitive information is not inadvertently leaked or
exposed.
10. What are the security implications of file reading attacks through a browser?
o Answer: File reading attacks can lead to unauthorized access to sensitive files
on a user's computer, potentially resulting in data breaches, privacy invasions,
and information theft. It's important to keep browsers updated and ensure proper
security settings are enabled to mitigate such risks.
Chapter 9
6. MCQ: Which of the following is not a suggested action for Database Access Control?
o A) Renaming the administrator account.
o B) Enabling all guest/public accounts.
o C) Assigning the lowest possible permissions necessary.
o D) Restricting access to databases via DBMS.
o Answer: B) Enabling all guest/public accounts.
7. MCQ: In the context of data backup, what is the main advantage of incremental backups
over full backups?
o A) Incremental backups take longer to perform.
o B) Incremental backups require more storage space.
o C) Incremental backups are faster and require less storage space.
o D) Incremental backups are more secure.
o Answer: C) Incremental backups are faster and require less storage space.
8. MCQ: What does Data Loss Prevention (DLP) aim to protect against?
o A) Physical damage to data storage devices.
o B) Unauthorized disclosure of sensitive data.
o C) Hardware failure resulting in data loss.
o D) Data corruption due to software bugs.
o Answer: B) Unauthorized disclosure of sensitive data.
9. MCQ: According to the slides, what is a significant challenge with removable media
controls?
o A) They are easy to enforce.
o B) They are welcomed by all employees.
o C) They can reduce functionality and are difficult to enforce.
o D) They increase the security of the system without any downsides.
o Answer: C) They can reduce functionality and are difficult to enforce.
10. MCQ: What is the purpose of using encryption for data protection?
o A) To speed up data transfer.
o B) To make data unreadable without the proper key.
o C) To compress data and save storage space.
o D) To create a backup of the data.
o Answer: B) To make data unreadable without the proper key.
Additional Short Answer Questions:
4. Short Answer: Why is it necessary to have strong access control policies for backup
media?
o Answer: Strong access control policies for backup media are necessary to
prevent unauthorized access and potential misuse or theft of sensitive data. They
ensure that only authorized personnel can access and handle the backups,
reducing the risk of data breaches.
5. Short Answer: What is key escrow, and what is a downside of user-managed key
escrow?
o Answer: Key escrow is the practice of keeping a secure copy of encryption keys
with a third party or within a corporate server. A downside of user-managed key
escrow is the increased risk of the keys being mishandled or lost, which could
result in data becoming permanently inaccessible.
6. Short Answer: What is information triangulation, and how can it affect personal privacy?
o Answer: Information triangulation is the process of combining different data
elements from various sources to identify an individual. It can affect personal
privacy by potentially re-identifying individuals from anonymized data sets,
leading to privacy breaches.
4. Long Answer: Explain the role of Data Loss Prevention (DLP) in a corporate
environment and the challenges associated with data collection.
o Answer: DLP systems in a corporate environment help safeguard against the
unauthorized use and transmission of confidential information, aiming to prevent
sensitive data from leaving the corporate network. These systems can include
software solutions that classify regulated, confidential, and business-critical data
and identify violations of policies defined by organizations. The challenges with
data collection include managing the vast amounts of data that companies collect
and ensuring comprehensive protection, as companies often struggle with
securing more data than they can manage effectively.
Chapter 10
Multiple Choice Questions (MCQs)
1. What is the primary focus during any disaster recovery situation according to
business continuity principles?
A. Protecting IT infrastructure
B. Restoring data from backups
C. Protecting people first
D. Updating the continuity plan
Answer: C. Protecting people first
2. Which type of site is fully equipped and ready for immediate operation during IT
disaster recovery? A. Warm sites B. Hot sites C. Cold sites D. Shared sites
Answer: B. Hot sites
3. What is a critical aspect to consider when planning for business continuity? A.
Rigidity of the plan B. Flexibility to adapt C. The color scheme of the recovery site D. The
brand of backup tapes used
Answer: B. Flexibility to adapt
4. What is the main challenge associated with testing the IT Disaster Recovery Plan?
A. It is unnecessary B. It is time-consuming C. It is difficult and expensive D. It is easy
and cost-effective
Answer: C. It is difficult and expensive
5. In IT Disaster Recovery, why are remote backup tapes necessary? A. To comply
with IT policies B. For restoration of data if the primary site is compromised C. They are
not necessary; cloud backups have replaced tapes D. For testing purposes only
Answer: B. For restoration of data if the primary site is compromised
4. Describe the importance of 'taking your time quickly' in the context of incident
response.
Answer: 'Taking your time quickly' refers to the balance between rapid response
and careful analysis. It is important to act swiftly to mitigate damage during a
security incident, but also crucial to take enough time to accurately assess the
situation and respond effectively. Quick, ill-considered actions can lead to
mistakes that compound the issue, so the response should be both prompt and
thoughtful.
5. Explain the differences between hot sites, cold sites, and site sharing in disaster
recovery plans.
Answer: Hot sites are fully equipped data centers ready for immediate use; cold
sites are spaces that are equipped with necessary facilities but without the actual
IT infrastructure; site sharing involves using another firm's site for disaster
recovery. Hot sites offer rapid readiness but at higher costs, cold sites are
cheaper but take longer to set up, and site sharing requires compatibility and
coordination between different firms' infrastructures.
6. Discuss the role of rehearsals in maintaining speed and accuracy during incident
response.
Answer: Rehearsals, such as walkthroughs and live tests, are critical in incident
response to build speed and reveal plan deficiencies. Practicing the response
plan helps teams respond more rapidly and accurately when a real incident
occurs, as they are familiar with the procedures and can work effectively under
pressure. Rehearsals can range from simple tabletop exercises to complex
simulations that mimic real-world scenarios.