Tag: security

Questions Related to security

  1. It allows the spread of worms

  2. It is a connection-oriented protocol

  3. It is a “fire and forget” protocol

  4. The IP address is easily spoofed


Correct Option: D
  1. Control Identification

  2. Threat Modeling

  3. Control Prioritization

  4. Attack Surface Evaluation


Correct Option: B
  1. Repudiation

  2. Eavesdropping

  3. Spoofing

  4. Hijacking


Correct Option: C
Explanation:

To solve this question, the user needs to be familiar with common cybersecurity threats.

Now, let's go through each option and explain why it is right or wrong:

A. Repudiation: This option refers to an attacker's attempt to deny that they have performed an action. It does not involve impersonating another user or using a false identity to gain access to a system.

B. Eavesdropping: This option refers to an attacker's attempt to intercept and listen to communications between two parties. It does not involve using a false identity to gain access to a system.

C. Spoofing: This option is correct. Spoofing involves an attacker using a false identity to gain access to a system. This can be accomplished through a variety of means, such as email spoofing or IP address spoofing.

D. Hijacking: This option refers to an attacker's attempt to take control of a system or communication channel. It does not necessarily involve using a false identity, although it can be a means to that end.

The Answer is: C

  1. Repudiation

  2. Eavesdropping

  3. Spoofing

  4. Hijacking


Correct Option: A
Explanation:

To answer this question, the user needs to be familiar with the basic security concepts.

The ability of users to deny that they performed specific actions or transactions is known as repudiation. This can occur when a user denies that they have performed an action such as sending an email or making a purchase.

Therefore, the correct answer is: A. Repudiation

  1. Measuring the relative attack surface

  2. Quantifying the level of risk

  3. Enumerating the entry points and exit points

  4. Identifying the type of accessibility required


Correct Option: B
  1. It does not block incoming traffic

  2. It does not block outgoing traffic.

  3. It can be turned off.

  4. It can’t be turned off.


Correct Option: C
  1. Follow security best practices

  2. Depend on the number of sources researched

  3. Not depend on the technology of the application

  4. Address as few threat types as possible


Correct Option: A

A normal user assuming the identity of an administrator is what kind of attack?

  1. Elevation of privilege

  2. Denial of service

  3. Spoofing

  4. Repudiation


Correct Option: A
  1. Has a smaller attack surface than an unhardened OS

  2. Implements mandatory access control

  3. Is less secure than an unhardened OS

  4. Has more entry and exit points than an unhardened OS system


Correct Option: A