1) A malicious worm program is characterized by the fundamental attribute a) Local installation with expert system b) Multi-stage provisioning based on simple tools c) Auto-propagation without human intervention  d) Simpler design than a Trojan horse program e) All the above 2) Learning the incredibly easy, but devastatingly effective techniques for hacking an old soda machine is a) Security fixes might be simple and effective b) Security physical systems are simpler than you would think c) Simple attacks might prompt complex redesigns d) No system can ever be secure 3) Cyber adversary motivation does not include which of the following: a) Curiosity b) Money c) Politics d) Fame e) None of the above 4) Remote exploitation of an unaltered vehicle by hackers is enabled by which of the following design decisions: a) Being careless about the so-called “on-board bus architecture” b) Not enforcing separation between on-board entertainment and safety systems c) Using older, unsafe programming languages d) All of the above 5) The root cause of some discovered cyber security vulnerability might reasonably be which of the following: a) The developers didn’t invest enough money during development b) The designers had too much technical training c) The government regulators were smarter than the developers expected d) It was hidden and therefore acceptable to leave in place 6) The integrity threat can be exemplified by which of the following scenarios: a) Every customer record is stolen by hackers b) Every customer record is exposed by nation states c) Customer records were hidden, but one might have been slightly garbled d) The entire company database was posted to the Internet e) None of the above 7) Embedding a trap door into a login program results in which of the following: a) An improved version of the login program with enhanced secret access b) A compliant version of the code with respect to some process frameworks c) A trap door program with the potential to lock out authorized users d) A login program that requires encryption support e) A Trojan horse 8) Which of the following statements is true? a) Dirty code is sometimes produced by clean compilers. b) Dirty compilers are always written from clean code. c) Dirty code is always produced by dirty developers. d) Clean code has no real difference from dirty code. e) Dirty compilers never produce clean code. 9) Which of the following is a reasonable conclusion that one might draw by studying Unix kernel attacks such as the old IFS exploit? a) The object code for an OS runtime system cannot be understood b) Open source code cannot help in the design of an attack c) Setting variables by users of an OS should be encouraged d) Set-uid-to-root should be used more extensively in OS design e) Seeing open source code might help one design an attack. 10) Buffer overflow attacks might best be avoided by which of the following preventive approaches: a) Picking better variable names b) Using languages with strong type enforcement c) Improving in-line comments d) Replacing call-by-value with call-by-name e) None of the above

per en/la

Tauler de classificació

Estil visual

Opcions

Canvia de fonament

Restaurar desada automàtica: ?