Quiz 2 infa 610 foundations of information security and assurance

I have complete test bank for this class quiz message me for testbank


Name_________________________                                    Date____________________

·      There are 30 questions in this Quiz and each question is worth 2 points

·      The quiz is worth 10% of your final grade for the course.

·      For multiple choices, circle the option that best answers the question. For True/False, put either a T or F next to the question. For Fill in the blank choose your answer

·      Please provide your answers in the Answer Table below.

·      The quiz is due on Sunday November 1, 11:59 US EDT. Early submission is encouraged and is welcomed. There will be a 20% penalty for every day late (less than or equal 24 hours is considered a day) until no points are left.

·      The quiz is to be of your own work and no other individuals may assist you in this effort.

·      When applicable please provide your own examples to complement your material.

·      Please put your name & date at the top of the document and name your file using this file naming convention: fLastQuiz2.doc, e.g. the Quiz 1 file name for me would be aGhafarianQuiz1.doc

·      Please submit your work using the Quiz1 link in the Assignment area of LEO.

·      Use Cybercafé to post your questions about the Quiz but no questions about the questions themselves.



1.     Malicious software aims to trick users into revealing sensitive personal data.

2.     Keyware captures keystrokes on a compromised system.

3.     The buffer overflow type of attack is one of the least commonly seen attacks

4.     Several of the items in the CWE/SANS Top 25 Most Dangerous Software Errors list, Risky Resource Management category, are buffer overflow variants.

5.     Security flaws occur as a consequence of sufficient checking and validation of data and error codes in programs.

6.     A difference between defensive programming and normal practices is that everything is assumed.

7.     It is possible for a system to be compromised during the installation process.

8.     Ideally new systems should be constructed on an unprotected network in order to prevent installation restrictions.


9.     A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim’s data is __________.

a.     Adobe

b.     Animoto

c.     malware

d.     Prezi


10.  A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.

a.     logic bomb

b.     trapdoor

c.     worm

d.     Trojan horse


11.  A _______ can occur as a result of a programming error when a process attempts to      store data beyond the limits of a fixed-size buffer.

a.     shellcode

b.     program overflow

c.     buffer overflow

d.     library function


12.  A ______ is a structure where data are usually saved on the stack.

a.     guard page

b.     stack frame

c.     heap

d.     NOP sled


13.  _________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.

a.     PHP attack

b.     Format string injection attack

c.     XSS  attack.

d.     Injection attack


14.  A _______ attack is where the input includes code that is then executed by the attacked system.

a.     SQL injection

b.     cross-site scripting

c.     code injection

d.     interpreter injection



15.  The first step in deploying new systems is _________.

a.     security testing

b.     installing patches

c.     planning

d.     secure critical content


16.  Which of the following need to be taken into consideration during the system  security planning process?

a.     how users are authenticated

b.     the categories of users of the system

c.     what access the system has to information stored on other hosts

d.     all of the above



17.  A _________ is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence of its presence.


18.  A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.


19.  The function of the _______ was to transfer control to a user command line interpreter that gave access to any program available on the system with the privileges of the attacked program.


20.  One of the restrictions on the content of shellcode is that it has to be _______, which means that it cannot contain any absolute address referring to itself.


21.  Two key areas of concern for any input are the _______ of the input and the meaning and interpretation of the input.


22.  A number of widely used standard C _________ compound the problem of buffer overflow by not providing any means of limiting the amount of data transferred to the space available in the buffer.


23.  System security begins with the installation of the ________.


24.  The final step in the process of initially securing the base operating system is ________.


25.  ______ is a reactive control that can only inform you about bad things that have already happened.



Answer Table




















































Short Answer

26.  What are three broad mechanisms that malware can use to propagate?

27.  What are four broad categories of payloads that malware may carry?

28.  How does behavior- blocking software work?

29.  What is a digital immune system?

30.  There is a flaw in the virus program of Figure 6.1 . What is it?





Study Locus
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.


Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.


Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.


Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.


Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.