CS 3113 - Final Review (Everything)
Exam Study Guide
(T/F) With the attention that computer security is receiving in the media today, as
a result of the numerous security breaches we can read about, preventing,
detecting, and prosecuting computer crime has become easier. - ANSWER False
An individual who blocks the traffic from an authorized user to a system they are
authorized to access is conducting which of the following threat types? -
ANSWER Interruption
An individual who simply "listens" to the traffic that is being sent by an
authorized user between systems is an example of which of the following threat
types? - ANSWER Interception
Which of the following is the name for a program that holds a computer
"hostage" while demanding a ransom? - ANSWER Ransomware
Which of the following describes the "CIA Triad"? - ANSWER Confidentiality,
integrity, Availability
Which level of threat includes disgruntled employees seeking to harm your
systems? - ANSWER Unstructured Threats
Which of the following best describes the changes (if any) that have occurred to
the average intruder knowledge and the attack sophistication over the last few
decades? - ANSWER The average required intruder knowledge has decreased
while the attack sophistication has increased.
What does the term "threat" refer to in computer security? - ANSWER Any
potential threat that could cause an undesirable outcome - including natural
disasters
Which of the following is the name for a program that appears to do one thing
(and may indeed do it) but that hides something else? - ANSWER Trojan Horse
Which of the following is the name for a program that reproduces by attaching
copies of itself to other programs and which often carries a malicious
"payload"? - ANSWER Virus
(T/F) Issues of proprietary software and trade secrets complicate the
application of the Open Design principle. In some cases companies may not
want their designs made public, lest their competitors use them. The principle
,then requires that the design and implementation be available to people barred
from disclosing it outside of the company. - ANSWER True
Which disclosure paradigm has as its assumptions that 1) an attacker will learn
little or nothing from disclosure; 2) Disclosure will prompt designers to improve
the design of defenses, and 3) Disclosure will prompt other defenders to take
action? - ANSWER Open Source
What is the name of the method of communication between two computers
(arbitrarily named here client and server) in which information is encoded, and
possibly encrypted, into a sequence of port numbers? Initially, the server
presents no open ports to the public and is monitoring all connection attempts.
The client initiates connection attempts to the server by sending SYN packets to
the ports specified in a special sequence. The server offers no response to the
client during this phase, as it "silently" processes the port sequence. When the
server decodes a valid sequence it triggers a server-side process and response.
- ANSWER Port Knocking
What is the name given to a form of host-to-host communication in which
information flows across closed ports. Information may be encoded into a port
sequence or a packet-payload. In general, data are transmitted to closed ports
and received by a monitoring daemon which intercepts the information without
sending a receipt to the sender. - ANSWER Port Knocking
Can all issues with complexity be avoided through the use of one of the secure
design principles identified in class? - ANSWER No
(T/F) The number of bugs introduced by a bug fix release may actually exceed
the number of bugs fixed by that release. - ANSWER True
In cyber security, one of the best ways to protect a computer or network is with
a strategy called defense in depth. This strategy means that there are multiple
defenses put in place. If one fails, it is likely another will catch the problem.
Which method of reducing complexity is this concept most closely aligned with?
- ANSWER Layering
When viewing a Drone Pilot app, the screen will show "flight instruments" that
indicate how fast the drone is flying and how high it is off the ground. Which
method is this an example of? - ANSWER Abstraction
While a password should be long and complex so that it will be difficult to break,
the password should be easy for you to remember. One way to do this is to take
the first letter of each word from a song that you know. Which design principle is
this most closely aligned with? - ANSWER Simplicity
,Which of the following was described as one of the main drawback to the
waterfall software development model? - ANSWER The Waterfall model does not
easily accommodate change after the process is underway. One phase has to be
completed before moving onto the next phase.
Which of the following was NOT one of the three items described as necessary
for the DoD cyber strategy of Deterrence to be effective? - ANSWER Train cyber
forces to be able to operate in both offensive and defensive activities.
(T/F) A key fraud control is Separation of Duties. For example, someone who
orders a computer cannot also sign that it was received, nor should they directly
receive the computer. This prevents an individual from placing fake orders and
paying themselves. - ANSWER True
Which of the following are advantages of an iterative design process? - ANSWER
B,C,D, but not A
A....It results in the fastest development of software; it is the quickest design
process.
B....Having a working system available at all times helps provide assurance that
something can be built.
C....It provides on-going experience with the current technology ground rules
and an opportunity to discover and fix bugs.
D....It is easier to incorporate technology changes that arrive during the system
development.
Which design principle states that you should start with a simple, working
system that meets only a modest subset of the requirements, and then evolve
the system in small steps to gradually encompass more and more of the full set
of requirements? - ANSWER Design for Iteration
What is the name given to the software testing technique, which basically
consists of finding implementation bugs using malformed/semi-malformed data
injection in an automated fashion? - ANSWER Fuzzing
Rather than deliver the system as a single delivery, the development and
delivery is broken down into increments with each increment delivering part of
the required functionality describes which development model? - ANSWER
Incremental Development
Which NSA security design principle has as a basic tenet that a feature should
do "the least surprising thing"? - ANSWER Least Astonishment
(T/F) Users won't specify protections correctly if the specification doesn't make
sense to them. This is known as Psychological Acceptability which is related to
the design principle of Simplicity as it "keeps things simple" . - ANSWER False
, (T/F) Because cryptography is a highly mathematical subject, companies that
market cryptographic software or use cryptography to protect user data
frequently keep their algorithms secret. Experience has shown that such
secrecy adds little if anything to the security of the system. Worse, it gives an
aura of strength that is all too often lacking in the actual implementation of the
system. - ANSWER True
In the "CIA Triad", which element states that only authorized individuals may
view the data being protected? - ANSWER Confidentiality
In which disclosure paradigm may disclosure provide little advantage for the
defenders but potentially have a tremendous benefit for attackers? - ANSWER
Military
According to Joint Publication 3-12, DoD Information Network (DODIN)
operations include which of the following? - ANSWER Operational actions taken
to secure, configure, operate, extend, maintain, and sustain DOD cyberspace
and to create and preserve the confidentiality, availability, and integrity of the
DODIN.
Many computers are built with parts that can easily be taken out and replaced
with other parts. This makes it easier to troubleshoot and fix. What is the name
for this method of reducing complexity? - ANSWER Modularity
Which disclosure paradigm has as its assumptions that 1) Attackers may learn a
lot from disclosure; 2) Disclosure may teach the defenders how to design better
systems, and 3) Disclosure will prompt more defenders to take protective
actions? - ANSWER Information Sharing
Often a secret may consist of two (or more) parts. Knowing any of the parts
individually may not be secret, but putting them together they become a secret
you need to protect. This concept is known as which of the following? - ANSWER
Aggregation
"You won't get it right the first time, so design it to be easy to change" is the
guiding philosophy for which security design principle? - ANSWER Iteration
(T/F) Rigorous testing allows applications to be made 100% secure. - ANSWER
False
"When you log into a computer, it is a good practice to do so as a regular user
instead of as an administrator or super user. A normal user can perform most of
the common tasks and does not need to be an administrator. It also protects a
computer from increased harm if there is a virus present" is a statement of what
security principle? - ANSWER Least Privilege
Exam Study Guide
(T/F) With the attention that computer security is receiving in the media today, as
a result of the numerous security breaches we can read about, preventing,
detecting, and prosecuting computer crime has become easier. - ANSWER False
An individual who blocks the traffic from an authorized user to a system they are
authorized to access is conducting which of the following threat types? -
ANSWER Interruption
An individual who simply "listens" to the traffic that is being sent by an
authorized user between systems is an example of which of the following threat
types? - ANSWER Interception
Which of the following is the name for a program that holds a computer
"hostage" while demanding a ransom? - ANSWER Ransomware
Which of the following describes the "CIA Triad"? - ANSWER Confidentiality,
integrity, Availability
Which level of threat includes disgruntled employees seeking to harm your
systems? - ANSWER Unstructured Threats
Which of the following best describes the changes (if any) that have occurred to
the average intruder knowledge and the attack sophistication over the last few
decades? - ANSWER The average required intruder knowledge has decreased
while the attack sophistication has increased.
What does the term "threat" refer to in computer security? - ANSWER Any
potential threat that could cause an undesirable outcome - including natural
disasters
Which of the following is the name for a program that appears to do one thing
(and may indeed do it) but that hides something else? - ANSWER Trojan Horse
Which of the following is the name for a program that reproduces by attaching
copies of itself to other programs and which often carries a malicious
"payload"? - ANSWER Virus
(T/F) Issues of proprietary software and trade secrets complicate the
application of the Open Design principle. In some cases companies may not
want their designs made public, lest their competitors use them. The principle
,then requires that the design and implementation be available to people barred
from disclosing it outside of the company. - ANSWER True
Which disclosure paradigm has as its assumptions that 1) an attacker will learn
little or nothing from disclosure; 2) Disclosure will prompt designers to improve
the design of defenses, and 3) Disclosure will prompt other defenders to take
action? - ANSWER Open Source
What is the name of the method of communication between two computers
(arbitrarily named here client and server) in which information is encoded, and
possibly encrypted, into a sequence of port numbers? Initially, the server
presents no open ports to the public and is monitoring all connection attempts.
The client initiates connection attempts to the server by sending SYN packets to
the ports specified in a special sequence. The server offers no response to the
client during this phase, as it "silently" processes the port sequence. When the
server decodes a valid sequence it triggers a server-side process and response.
- ANSWER Port Knocking
What is the name given to a form of host-to-host communication in which
information flows across closed ports. Information may be encoded into a port
sequence or a packet-payload. In general, data are transmitted to closed ports
and received by a monitoring daemon which intercepts the information without
sending a receipt to the sender. - ANSWER Port Knocking
Can all issues with complexity be avoided through the use of one of the secure
design principles identified in class? - ANSWER No
(T/F) The number of bugs introduced by a bug fix release may actually exceed
the number of bugs fixed by that release. - ANSWER True
In cyber security, one of the best ways to protect a computer or network is with
a strategy called defense in depth. This strategy means that there are multiple
defenses put in place. If one fails, it is likely another will catch the problem.
Which method of reducing complexity is this concept most closely aligned with?
- ANSWER Layering
When viewing a Drone Pilot app, the screen will show "flight instruments" that
indicate how fast the drone is flying and how high it is off the ground. Which
method is this an example of? - ANSWER Abstraction
While a password should be long and complex so that it will be difficult to break,
the password should be easy for you to remember. One way to do this is to take
the first letter of each word from a song that you know. Which design principle is
this most closely aligned with? - ANSWER Simplicity
,Which of the following was described as one of the main drawback to the
waterfall software development model? - ANSWER The Waterfall model does not
easily accommodate change after the process is underway. One phase has to be
completed before moving onto the next phase.
Which of the following was NOT one of the three items described as necessary
for the DoD cyber strategy of Deterrence to be effective? - ANSWER Train cyber
forces to be able to operate in both offensive and defensive activities.
(T/F) A key fraud control is Separation of Duties. For example, someone who
orders a computer cannot also sign that it was received, nor should they directly
receive the computer. This prevents an individual from placing fake orders and
paying themselves. - ANSWER True
Which of the following are advantages of an iterative design process? - ANSWER
B,C,D, but not A
A....It results in the fastest development of software; it is the quickest design
process.
B....Having a working system available at all times helps provide assurance that
something can be built.
C....It provides on-going experience with the current technology ground rules
and an opportunity to discover and fix bugs.
D....It is easier to incorporate technology changes that arrive during the system
development.
Which design principle states that you should start with a simple, working
system that meets only a modest subset of the requirements, and then evolve
the system in small steps to gradually encompass more and more of the full set
of requirements? - ANSWER Design for Iteration
What is the name given to the software testing technique, which basically
consists of finding implementation bugs using malformed/semi-malformed data
injection in an automated fashion? - ANSWER Fuzzing
Rather than deliver the system as a single delivery, the development and
delivery is broken down into increments with each increment delivering part of
the required functionality describes which development model? - ANSWER
Incremental Development
Which NSA security design principle has as a basic tenet that a feature should
do "the least surprising thing"? - ANSWER Least Astonishment
(T/F) Users won't specify protections correctly if the specification doesn't make
sense to them. This is known as Psychological Acceptability which is related to
the design principle of Simplicity as it "keeps things simple" . - ANSWER False
, (T/F) Because cryptography is a highly mathematical subject, companies that
market cryptographic software or use cryptography to protect user data
frequently keep their algorithms secret. Experience has shown that such
secrecy adds little if anything to the security of the system. Worse, it gives an
aura of strength that is all too often lacking in the actual implementation of the
system. - ANSWER True
In the "CIA Triad", which element states that only authorized individuals may
view the data being protected? - ANSWER Confidentiality
In which disclosure paradigm may disclosure provide little advantage for the
defenders but potentially have a tremendous benefit for attackers? - ANSWER
Military
According to Joint Publication 3-12, DoD Information Network (DODIN)
operations include which of the following? - ANSWER Operational actions taken
to secure, configure, operate, extend, maintain, and sustain DOD cyberspace
and to create and preserve the confidentiality, availability, and integrity of the
DODIN.
Many computers are built with parts that can easily be taken out and replaced
with other parts. This makes it easier to troubleshoot and fix. What is the name
for this method of reducing complexity? - ANSWER Modularity
Which disclosure paradigm has as its assumptions that 1) Attackers may learn a
lot from disclosure; 2) Disclosure may teach the defenders how to design better
systems, and 3) Disclosure will prompt more defenders to take protective
actions? - ANSWER Information Sharing
Often a secret may consist of two (or more) parts. Knowing any of the parts
individually may not be secret, but putting them together they become a secret
you need to protect. This concept is known as which of the following? - ANSWER
Aggregation
"You won't get it right the first time, so design it to be easy to change" is the
guiding philosophy for which security design principle? - ANSWER Iteration
(T/F) Rigorous testing allows applications to be made 100% secure. - ANSWER
False
"When you log into a computer, it is a good practice to do so as a regular user
instead of as an administrator or super user. A normal user can perform most of
the common tasks and does not need to be an administrator. It also protects a
computer from increased harm if there is a virus present" is a statement of what
security principle? - ANSWER Least Privilege