click below
click below
Normal Size Small Size show me how
CSI 325 Exam 3
| Question | Answer |
|---|---|
| What is the easiest control against malicious code? | Hygiene — avoiding behavior that allows malicious code contamination. |
| What are the two components of computer hygiene? | (1) Avoid points of contamination and (2) Block avenues of vulnerability. |
| Give examples of good computer hygiene practices. | Use commercial software from reliable vendors, test new software on isolated systems, scan with up-to-date antivirus, and make multiple write-protected backups. |
| What is a system image, and why is it important? | A recoverable copy of system files that can be restored after infection; it allows a secure reboot and recovery. |
| How can you block vulnerabilities? | By patching as soon as possible once updates are released. |
| What is a zero-day attack? | An exploit of a previously unknown vulnerability before a patch exists. |
| What is a virus detector? | A tool that searches for signs (signatures) of malicious code infection. |
| What are the two main limitations of virus detectors? | 1) They only find known infections. 2) Their detection patterns are static. |
| Why must virus detectors be constantly updated? | Because attackers create new code that avoids known signatures. |
| What is the “herd immunity” concept in malware detection? | The more systems are protected and updated, the less chance malware has to spread effectively. |
| Why is antivirus still useful even if it detects only 45% of malware? | It provides an essential first layer of defense, catching many common infections early. |
| What is a virus signature? | A unique pattern of instructions or data that identifies a specific virus. |
| Define modularity in software design. | Dividing a task into independent subtasks or components that each perform a single function. |
| What are the four main characteristics of modular components? | Single purpose, small size, simplicity, and independence. |
| What are the benefits of modularity? | Easier maintenance, reuse, testing, and improved correctness. |
| What do cohesion and coupling mean? | Cohesion = how closely related elements of a module are; Coupling = how dependent modules are on each other. High cohesion + low coupling = better design. |
| What is encapsulation? | Hiding a component’s internal details while exposing only necessary functionality. |
| Name three types of software testing. | Unit testing, integration testing, and regression testing. |
| What are James Whittaker’s seven key ingredients for testing? | Product expertise, coverage, risk analysis, domain expertise, common vocabulary, variation, and boundaries. |
| What percentage of faults are typically found during integration testing? | About 29.4%. |
| What are two main limitations of testing? | (1) It can only show the presence of defects, not their absence. (2) Testing the full input space is impossible. |
| Why can testing itself be risky? | Testing the internal structure might require modifying code, which can introduce new vulnerabilities. |
| What is the goal of secure design principles? | To reduce vulnerabilities and improve system integrity through correct coding and architecture. |
| List six key design principles for security. | Least privilege, economy of mechanism, open design, complete mediation, separation of privilege, and least common mechanism. |
| What is the principle of least privilege? | Give users and programs only the minimum access necessary to perform their tasks. |
| What is complete mediation? | Every access to every object must be checked for authorization. |
| What are CERT’s Top 10 Secure Coding Practices (name at least four)? | Validate input, heed compiler warnings, keep it simple, default to deny, practice defense in depth, and adopt a secure coding standard. |
| What is penetration testing? | Authorized ethical hacking to find and report vulnerabilities using attacker-like methods. |
| What are limitations of penetration testing? | It’s time-consuming, may not find all flaws, and can give a false sense of complete safety. |
| Why are formal proofs of correctness rarely used? | They are extremely complex, often infeasible (NP-complete), and hard to scale. |
| Why is “penetrate and patch” ineffective? | It’s reactive—fixing only after attacks occur and often introducing new bugs. |
| Why does “security by obscurity” fail? | Hidden mechanisms will eventually be discovered; true security relies on robust design, not secrecy. |
| What is a shared secret? | A secret known only to two entities used to verify identity. |
| What is a one-time password (OTP)? | A unique password valid for one session or transaction only. |
| What is out-of-band communication? | Using separate channels for parts of authentication, like sending a PIN via mail separate from a card. |
| What is continuous authentication? | Ongoing identity verification throughout a session, often through encryption or biometrics. |
| What is false or misleading content? | Digital information that’s been altered or forged to deceive users. |
| What is Cross-Site Scripting (XSS)? | An attack where malicious scripts are injected into trusted web content. |
| What is a persistent XSS attack? | When malicious scripts are stored on the target server and executed for every user who accesses it. |
| How do you prevent XSS? | Sanitize user input, encode output, and enforce content security policies. |
| What is SQL injection? | Inserting malicious SQL into a query to manipulate a database. |
| What does “OR ‘1’=‘1’” do in a SQL injection? | It returns all records because the condition always evaluates to true. |
| What is a dot-dot-slash (../) attack? | A directory traversal that accesses files outside the intended directory. |
| Name five OS functions related to security. | Enforced sharing, interprocess communication, protection of OS data, user authentication, and memory protection. |
| What is fair service in an OS? | Ensuring all users receive CPU time and resources without starvation. |
| What is memory protection? | Preventing one process from accessing another’s memory space. |
| What is the kernel in an OS? | The core component that performs low-level functions supporting all higher-level processes. |
| What is a honeypot? | A fake system or environment designed to attract attackers and study their behavior safely. |
| Why are honeypots often run in virtual machines? | To isolate attacker activity and prevent risk to real systems. |
| What are the four types of separation in OS security? | Physical, temporal, logical, and cryptographic. |
| What is temporal separation? | Running processes with different security levels at different times. |
| What is logical separation? | Making processes believe they’re the only ones running (isolated virtual environment). |
| What are four sharing policies an OS can use? | Do not protect, isolate, share all/share nothing, and share but limit access. |
| What is packet sniffing? | Capturing network packets traveling over a LAN to view data. |
| How can attackers wiretap without touching a cable? | Through inductive radiation interception. |
| Why is optical fiber harder to tap? | Requires optical tuning; light doesn’t emit electromagnetic radiation like copper cables. |
| What is microwave communication’s main vulnerability? | Easy interception along its wide line-of-sight path. |
| What is a replay attack? | Reusing intercepted legitimate data, like resubmitting a valid transaction. |
| How can replay attacks be prevented? | Use nonces or timestamps to ensure message uniqueness. |
| What is the main function of a firewall? | To filter traffic between trusted and untrusted networks according to a security policy. |
| What are the two main firewall policies? | Default permit and default deny. |
| What qualities make a firewall a reference monitor? | Always invoked, tamperproof, small, and simple enough for analysis. |
| What are types of firewalls? | Packet-filtering gateway, stateful inspection, proxy, circuit-level gateway, and guard. |
| What does “default deny” mean? | Anything not explicitly permitted is blocked. |
| What is an Intrusion Detection System (IDS)? | A system that monitors and analyzes activity to detect malicious behavior. |
| What are the two main IDS types? | Signature-based and heuristic (behavioral). |
| How does a signature-based IDS work? | It compares activity patterns to a database of known attack signatures. |
| What is a limitation of signature-based IDS? | It cannot detect new, unknown attacks. |
| How does heuristic IDS differ? | It looks for deviations from normal behavior rather than matching known patterns. |
| What is AI/ML-based intrusion detection? | Systems using artificial intelligence to learn and detect anomalies with up to 99.9% accuracy. |
| What are the three categories a heuristic IDS may classify activity into? | Benign (good), suspicious, and unknown. |
| Why is Wi-Fi difficult to secure? | Signals are broadcast publicly and management frames often lack encryption. |
| What protocol suite does Wi-Fi use? | IEEE 802.11 operating in the 2.4 GHz range. |
| What are hidden node and exposed node problems? | Overlapping wireless channels causing interference and data loss. |
| What is a rogue access point? | An unauthorized Wi-Fi hotspot impersonating a legitimate one. |
| Why doesn’t hiding an SSID guarantee security? | Clients still broadcast the SSID during reconnection, revealing it to attackers. |
| What is a denial-of-service (DoS) by addressing failure? | When routing tables are misdirected, causing data loss and site unavailability. |
| What is user vigilance in cybersecurity? | user vigilance refers to the awareness and caution users must maintain to recognize and avoid threats such as phishing, malware downloads, or social engineering attacks. |
| Why is user vigilance important? | Even with strong technical defenses, human error remains a major vulnerability; vigilant users can prevent breaches by recognizing suspicious activity or communications. |
| What are virus detectors? | Software tools that identify, isolate, and remove malicious code from systems by scanning files for known signatures or unusual behavior. |
| What are the two main methods used by virus detectors? | 1. Signature-based detection (identifying known virus patterns) 2. Heuristic/behavioral detection (spotting suspicious or abnormal activity). |
| What is modularity in security design? | Modularity means dividing a system into independent components, so if one is compromised, the others remain secure. |
| How does modularity help in cybersecurity? | It minimizes the spread of attacks and makes systems easier to test, update, and isolate when issues occur. |
| Why is testing critical in cybersecurity systems? | Testing ensures that security controls work as intended, identifies vulnerabilities before attackers do, and verifies system resilience under attack scenarios. |
| What are examples of countermeasures that don’t work? | Relying solely on firewalls or antivirus, using “security by obscurity,” or ignoring regular patching and updates — all give a false sense of security. |
| What is successful identification and authentication? | It means confirming a user’s identity (identification) and verifying that they are who they claim (authentication). |
| What is a shared secret? | A password or key known only by the user and the system for verifying identity. |
| What is a one-time password (OTP)? | A password valid for only one login session or transaction, reducing the risk of reuse attacks. |
| What is out-of-band communication in authentication? | Using a separate communication channel (like text message or app notification) to confirm a user’s identity, adding another security layer. |
| What is continuous authentication? | Ongoing verification of a user’s identity based on behavior or biometrics during a session |
| What is false or misleading content in cybersecurity? | Information crafted to deceive users—like phishing emails, fake news, or deepfakes—that can manipulate actions or trust. |
| What is cross-site scripting (XSS)? | A web attack where an attacker injects malicious scripts into a trusted website, often stealing cookies or session data. |
| How can XSS be prevented? | By sanitizing user input, using content security policies (CSP), and encoding output before displaying it on a web page. |
| What is an SQL injection? | An attack that injects malicious SQL commands into input fields to manipulate or access a database. |
| How do you prevent SQL injection attacks? | Use parameterized queries, input validation, and stored procedures. |
| What are security features of ordinary operating systems? | User accounts, permissions, access control lists (ACLs), encryption, and process isolation. |
| What is a honeypot? | A decoy system or server set up to attract attackers, gather information about attack methods, and distract them from real systems. |
| How does a honeypot help improve security? | It allows analysts to monitor attacker behavior and identify vulnerabilities in a controlled environment. |
| What does separation and sharing refer to in operating systems? | The balance between isolating processes for security (separation) and allowing controlled communication between them (sharing). |
| Why is separation important? | It prevents one compromised process from accessing or corrupting another process’s data. |
| What is transmission media? | The physical or wireless channels through which data travels—like copper wires, fiber optics, or radio waves. |
| Why is transmission media important for cybersecurity? | Different media have unique vulnerabilities (e.g., wiretaps on copper lines, signal interception on Wi-Fi). |
| What is a wiretap? | Unauthorized interception of communication across a network, often used for spying or data theft. |
| What is a replay attack? | When an attacker intercepts and reuses legitimate communication (like a login token) to impersonate a user. |
| How can replay attacks be prevented? | By using timestamps, nonces, and encryption in communication protocols. |
| What is a Denial of Service (DoS) attack? | A flood of traffic or requests that overwhelms a system, making it unavailable to legitimate users. |
| How can systems defend against DoS attacks? | Through rate limiting, traffic filtering, and redundant network paths (load balancing). |
| What is a firewall? | A network device or software that filters incoming and outgoing traffic based on predefined security rules. |
| What types of firewalls exist? | Packet-filtering, stateful inspection, proxy, and next-generation firewalls. |
| What is an Intrusion Detection System (IDS)? | Software or hardware that monitors network traffic for suspicious or malicious activity. |