information security 49
Quiz Questions
Part 1: True/False – Multiple Choice answers (2 Points Each)
- You are hired as a security consultant (ethical hacker) for XYZ Company to try and penetrate their website and provide a report on any vulnerabilities you found.After a few days of reconnaissance work on your target’s website, you decide to try and take it offline by sending 30,000 fake ping requests a minute. What is this attack called?
-
-
- Continuing from the scenario from question 1 above.You couldn’t redirect the website’s traffic to your own wireless rogue server, so you decide to send a fake email to the CEO of the company claiming you are from their IT department letting him know that he needs to reset his password on the link you provided.What is this attack called?
- Continuing from the scenario from question 1 above. You gain access to the company CEO’s files by infecting the web server system with the malicious code you wrote or got from a hacking site. What type of exploit is this?
- Buffer overflow
- Rootkit
- Back door
- Trojan horse
- Server logs provide all of these except.
- Assistance in post-event investigation.
- Alerts to suspicious activities that require further investigation.
- Tracking of an attacker’s activities.
- Required information for legal proceedings.
- Assistance in the recovery of the administrator.
- True or False
- True or False
- True or False
- True or False
Answer: ____
Answer: ____
Answer: ____
Answer: ____
Answer: ____
Answer: ____
Administrators should perform the following steps to harden and securely configure a server OS.
- Remove unnecessary services, applications, and network protocols.
- Configure OS user authentication.
- Configure resource controls appropriately.
Answer: ____
The Windows 10 defense stack includes: Device protection, Threat resistance, Identity protection, information protection, Breach detection investigation & response.
Answer: ____
Desktops are most often virtualized on computers with bare metal virtualization.Servers are most often virtualized on computers with hosted virtualization.
Answer: ____
A virtual machine has less layers than a native OS-based machine and so it has no potential for any vulnerabilities and no security problems.
Answer: ____
Part 2: Short Answers (10 points each). Please answer briefly and completely and cite all sources of information. Please restrict your answer for each question to one (1) page (double spaced) or less.
- Briefly explain the steps to harden and securely configure a server OS.
- Briefly explain what a buffer overflow is and how it is mitigated.
- Briefly describe these different malware types: Virus, Trojan horse, worm, adware, spyware, bot and rootkit.Provide an example of how each one is mitigated.