ITEC 626 Information Systems Infrastructure Computer Science Quiz 2
Multiple Choice Questions (2 points each):
- The buffer overflow type of attack has been known since it was first widely used by the __________ Worm in 1988.
- Code Red
- Slammer
- Morris Internet
- Alpha One
- A buffer _________ is a condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information.
- overflow
- virus
- trigger
- all of the above
- A consequence of a buffer overflow error is __________ .
- corruption of data used by the program
- unexpected transfer of control in the program
- possible memory access violation
- all of the above
- __________ is malware that encrypts the user’s data and demands payment in order to access the key needed to recover the information.
- Trojan horse
- Ransomware
- Crimeware
- Polymorphic
- A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.
- spam
- phishing
- DDoS
- Sniff
- __________ is the first function in the propagation phase for a network worm.
- Propagating
- Fingerprinting
- Keylogging
- Spear phishing
- The __________ is what the virus “does”.
- infection mechanism
- trigger
- logic bomb
- payload
- The __________ is when the virus function is performed.
- dormant phase
- propagation phase
- triggering phase
- execution phase
- __________ are used to send large volumes of unwanted e-mail.
- Rootkits
- Spammer programs
- Downloaders
- Auto-rooter
- A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.
- logic bomb
- trapdoor
- worm
- Trojan horse
Questions (10 Points)
- Describe the major security issues with virtual systems.
- What is the Linux/UNIX security model? How is it built around DAC?
- Describe four mitigations and the corresponding threat for each mitigation the user can configure in Windows 10?
Course: ITEC 626 Information Systems Infrastructure
School: University of Maryland University College
- 18/07/2017
- 15

