|
|
CSS 211 - Introduction to Network Security
Review for First Test
The following questions are provided to help you study for
the first test. Do not expect to see these exact questions on the test.
- What does the text mean when it says that there are simple tools for staging attacks on computers and networks?
- I
mentioned in the notes that Microsoft generally issues patches on the
second Tuesday of every month. What is your opinion about the frequency
of this schedule?
- The more secure a system is, the harder it may be to use.
Relate this to the patch schedule in the question above. Should there
be options?
- What is the classic security word for information only being accessed by those who are meant to access it?
- What is the classic security word for information only being changed by those who are allowed to change it?
- What is the classic security word for a system being up and ready to use when users expect it to be so?
- How are authentication and authorization different?
- Is there a good definition of the word "hacker"?
- What is a script kiddie?
- Why are employees possible security threats? Explain three ways they could be.
- What is the difference between a cybercriminal and a cyberterrorist?
- What is the difference between layering security measures and showing diversity in them?
- Give an example of using obscurity as a security measure.
- Viruses and worms both infect systems. What is an operational difference between them?
- What part of a system does a boot virus infect?
- What is a virus signature?
- What is the scope of each of these acts with regard to information security?
- HIPAA
- GLBA
- Sarbox
- Patriot Act
- COPPA
- Which of the social engineering scenarios is an attacker
using if he/she makes a request while pretending to be the person the
request is for?
- Which of the social engineering scenarios is an attacker
using if he/she pretends to be an employee of the company who needs
help to complete a task?
- Which of the social engineering scenarios is an attacker
using if he/she threatens to report the victim to an authority for
discipline?
- What is the difference between spear phishing and whaling?
- Think of a secure location you might like to enter, and tell me how to use tailgating to do so.
- What is a rootkit? Why might a user not notice a rootkit infection as opposed to an adware infection?
- Which category of malware harvests information without the user's notice, consent, or control?
- What is ransomware?
- What characteristic of network security devices causes attackers to consider using HTTP traffic as a vector?
- Why is Javascript Injection an appropriate name for the exploit that is usually called Cross Site Scripting?
- How could an SQL injection attack be used to create a back
door for an attacker? (If you are not familiar with SQL, do a web
search on the INSERT INTO command.)
- Is the usual cookie that is set by a web site a session cookie or a persistent cookie? What is its probable size?
- What is the difference between a first-party cookie and a third-party cookie?
- What kind of cookie is a Locally Shared Object? On what platforms would you expect to see and not see this kind of object?
- Why might a session hijack attack begin as a man-in-the-middle attack?
- Which is meant to have a broader scope of use, a browser plug-in or a browser add-on?
- Users are often warned not to open email attachments unless
they recognize who the email is from. Why is this an obsolete
recommendation?
- Assume you are using a standard signed integer in a running
application. What might be the result of an attacker overflowing that
integer by 100? How might that action apply to an attack during a
credit card payment transaction?
- How does a SYN flood attack work as a variant of a DDoS attack?
- What happens in the man-in-the-middle variant called a replay attack?
- What is an attacker's goal in an ARP Poisoning attack?
- What is an attacker's goal in a DNS Poisoning attack?
- What is the difference between an administrative security control and a technical security control?
- Security controls can be devices or procedures, according to the text. What is the third thing they could be?
- Why are deterrent controls probably the least expensive
type? Have you seen deterrent controls that may not have been
associated with other types of controls?
- With respect to an attack, when are each of the control subtypes applied: deterrent, preventive, detective, compensating, corrective.
- What is special about compensating controls, with regard to your normal procedures?
- The text discusses several types of barrier controls. Which of the controls mentioned are not meant to stop an attacker?
- Why are guards considered active controls instead of passive controls?
- What determines whether a remote monitor falls under preventive or detective controls?
- Which of the motion detection devices mentioned in the text
typically detects a change in the site instead of detecting an intruder?
- Why is a passage lock not really a lock?
- Why can we say that a privacy lock would not prevent a determined intruder?
- How is a door that is operated by swiping a magnetic-strip card different from one operated by a activating a proximity reader?
- What kinds of updates typically address security issues? What kinds typically do not?
- What are some of the options a user is typically offered regarding downloading and installing updates for Microsoft products?
- The text listed four principles that apply to hardened operating systems. What is meant by the principle of Least Privilege?
- What has been done if the system has been hardened by Kernal Pruning?
- What is a popup blocker?
- What are static systems? What can you do to defend them from attacks?
- The text discusses validating user input and data in several places. What could go wrong if we do not validate?
|