Tag: security

Questions Related to security

  1. Looting a bank

  2. Looting email addresses, personal information

  3. Stuxnet kind of attacks

  4. Distributing virus, worms


Correct Option: D
Explanation:

To answer this question, the user needs to know what cybercrime is and what activities constitute cybercrime.

Out of the given options, looting a bank is not a cybercrime. It is a traditional crime that can be committed without the use of computers or the internet.

On the other hand, looting email addresses, personal information, distributing viruses and worms are activities that can only be carried out through the use of computers and the internet, making them cybercrimes.

Stuxnet kind of attacks is a type of cybercrime which is designed to damage or destroy specific industrial equipment. Stuxnet was used to target Iran's nuclear program, and it caused physical damage to centrifuges at a uranium enrichment plant.

Therefore, the correct answer is:

The Answer is: D. Distributing virus, worms

Which of the following attacks cannot be controlled by a firewall

  1. Ping flood

  2. Request to access a non-standard port

  3. Request to access a standard port

  4. DDOS


Correct Option: D

AI Explanation

To answer this question, we need to understand the purpose and limitations of a firewall.

A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. Firewalls are designed to prevent unauthorized access to or from a private network and can control the flow of traffic based on factors like IP addresses, ports, protocols, and application types.

Now, let's go through each option to understand why it can or cannot be controlled by a firewall:

Option A) Ping flood - This option can be controlled by a firewall. A ping flood is a type of Denial-of-Service (DoS) attack where the attacker overwhelms a target system with a flood of ICMP Echo Request packets (ping requests). A firewall can be configured to limit or block ICMP packets, including ping requests, thus mitigating the effect of a ping flood attack.

Option B) Request to access a non-standard port - This option can be controlled by a firewall. A firewall can be configured to allow or block access to specific ports. If a request is made to access a non-standard port, the firewall can be configured to block that request, preventing unauthorized access.

Option C) Request to access a standard port - This option can be controlled by a firewall. A firewall can be configured to allow or block access to specific ports, including standard ports used by common protocols like HTTP (port 80) or HTTPS (port 443). By configuring the firewall rules, the administrator can control which requests are allowed or blocked.

Option D) DDoS (Distributed Denial-of-Service) - This option cannot be effectively controlled by a firewall alone. A DDoS attack involves multiple compromised computers (botnets) flooding a target system with a massive amount of traffic, overwhelming its resources and causing a denial of service. Firewalls are not designed to handle the scale and volume of traffic generated by a DDoS attack. DDoS mitigation requires specialized tools and techniques, such as traffic filtering, rate limiting, and load balancing, which go beyond the capabilities of a firewall.

Based on the explanations above, the correct answer is D) DDOS. This option cannot be effectively controlled by a firewall alone due to the scale and volume of traffic involved in a DDoS attack.

  1. SQL injection

  2. Social engineering attacks

  3. War-dialing attack

  4. War-driving attack


Correct Option: A
  1. cross-site scripting

  2. command injection

  3. SQL injection

  4. path traversal attacks


Correct Option: D
Explanation:

To answer this question, the user needs to have knowledge about different types of web attacks.

The answer is D. Path Traversal Attacks.

Option A is incorrect because Cross-site scripting (XSS) attacks allow an attacker to inject malicious scripts into a web page viewed by other users. This allows the attacker to steal user information, hijack user accounts, spread malware, and perform other malicious activities.

Option B is incorrect because Command Injection Attacks occur when an attacker sends malicious input to an application, tricking it into executing unintended commands. This can allow the attacker to run arbitrary commands on the web server, potentially compromising the server and its data.

Option C is incorrect because SQL Injection attacks occur when an attacker sends malicious SQL statements to a web application database. This can allow the attacker to view or modify data in the database, or even take control of the entire database server.

Option D is the correct answer because Path Traversal Attacks occur when an attacker manipulates a URL to access files outside of the web server's root directory. This can allow the attacker to view sensitive data or execute arbitrary code on the web server.

  1. Client-side data validation

  2. Filtering data with a default deny regular expression

  3. Running the application under least privileges necessary

  4. Using parameterized queries to access a database


Correct Option: A
Explanation:

To solve this question, the user needs to have knowledge on securing web applications against authenticated users.

Option A: Client-side data validation is not sufficient to secure web applications against authenticated users. It can be easily bypassed by attackers, and therefore this option is not recommended.

Option B: Filtering data with a default deny regular expression can help prevent malicious input from being accepted, which is a good security practice. Therefore, this option is recommended.

Option C: Running the application under least privileges necessary is a recommended security practice because it limits the damage that can be caused by a successful attack. Therefore, this option is recommended.

Option D: Using parameterized queries to access a database can help prevent SQL injection attacks, which is a good security practice. Therefore, this option is recommended.

Therefore, the option that is NOT recommended for securing web applications against authenticated users is option A: Client-side data validation.

The Answer is: A

  1. Sufficient to secure the application

  2. Sufficient only when combined with other controls

  3. Sufficient if the passwords are longer than six characters

  4. Sufficient if none of the users have administrative access


Correct Option: B
Explanation:

To solve this question, the user needs to have knowledge of the basic principles of security controls for database applications.

Option A: This option is incorrect because securing a database application with username/password access controls alone is not sufficient to fully secure the application. Although username/password access control is an essential security measure, it is not sufficient in isolation.

Option B: This option is correct because username/password access controls are necessary but not sufficient to fully secure a database application. Other controls such as encryption, access control lists, monitoring, and auditing should be combined with username/password access controls for a complete security solution.

Option C: This option is incorrect because the length of the password alone does not guarantee the security of the database application. There are other factors to consider such as password complexity, password rotation, and password storage.

Option D: This option is incorrect because even if none of the users have administrative access, username/password access controls alone are still not sufficient to fully secure a database application.

Therefore, the correct answer is:

The Answer is: B. Sufficient only when combined with other controls

  1. Blocking access to antivirus and antispyware updates

  2. Aggregating surfing habits across multiple users for advertising

  3. Customizing search results based on an advertiser's needs

  4. All of the above


Correct Option: D
  1. Trust user supplied data.

  2. Clean and validate all user input

  3. Use GET instead of POST.

  4. Allow the use of HIDDEN form fields.


Correct Option: B
Explanation:

To improve the overall quality of web applications, developers should abide by the following rule:

B. Clean and validate all user input.

Explanation:

Option A: Trusting user-supplied data is not a good practice, as it can lead to security vulnerabilities such as injection attacks, cross-site scripting (XSS), and cross-site request forgery (CSRF).

Option B: Clean and validate all user input is a good practice that can help prevent security vulnerabilities. Input validation can help ensure that the data is in the correct format and meets the expected criteria, while input cleaning can help remove any malicious content from the user input.

Option C: Using GET instead of POST is not a rule for improving the overall quality of web applications. GET and POST are different HTTP methods used in web applications, and each has its own advantages and disadvantages. Choosing the right method depends on the requirements of the application.

Option D: Allowing the use of HIDDEN form fields is not a rule for improving the overall quality of web applications. HIDDEN form fields can be used to store data that the user cannot see or modify, but they do not provide any security benefits.

Therefore, the correct answer is:

The Answer is: B. Clean and validate all user input.

  1. "Spoofed" e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords

  2. A type of computer virus

  3. An example of a strong password

  4. None of the above


Correct Option: A
  1. Attackers can use error messages to extract specific information from a system.

  2. Attackers can use unexpected errors to knock an application off line, creating a denial-of-service attack

  3. Attackers can use revealed error messages to craft more advance attacks to gain system access

  4. All of the above


Correct Option: D