Elance Internet Security Test Answers 2015
·
What does IP mean?
Instant
Protocol
Intellectual
Property
Instance
Principle
Internet
Protocol
When cookies are used as session identifiers, how are they then used as a potential security hazard?
Attackers
emulate users by stealing their cookies.
User's cookies
are altered to a virus-like state.
They
emulate user's by downloading all the victims information onto a virtual
machine.
They
emulate user's by stealing their personal identity.
Which of the following is a VALID type of Key Management System?
Dynamic Key
Management System
Integrated
Key Management System
Third-Party
Key Management System
Both
Integrated Key Management System and Third-Party Key Management System
What are TLS and SSL?
Internet
layers
Internet
protocols.
Network
layers.
Cryptographic
protocols.
What is a computer worm?
It
is malware designed to infect other computers.
It is
software designed to exploit networks.
It is
software designed to analyze and search for open ports.
It is a
software utilized to scan packets on open networks.
Is a Unix-based system vulnerable to viruses?
Yes. The
split is approximately 50/50 when it comes to attacks on Windows vs. Unix based
systems.
No. Linux
systems are totally impervious to attacks.
Yes, the
majority of viruses attack Unix-based systems.
Yes,
however the majority are coded to attack Windows-based systems.
There are two types of firewall. What are they?
Hardware
and software.
Internet-based
and home-based.
Digital and
electronic.
Remote and
local
Which of the following refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent?
Spyware
Trojan
horse
Malware
Botnet
What does cross-site scripting allow for attackers?
A phishing
attack that automatically downloads the victims personal information.
The
introduction of worm viruses into the victims website.
Injection
of client-side scripts into web pages.
Direct
introduction of viruses into a victims computer.
Which of the following is a means to access a computer program or entire computer system bypassing all security mechanisms?
Backdoor
Trojan
Horse
Phishing
Masquerading
Which of the following protocol used Port 443 and Port 80 respectively
HTTPS
and HTTP
DHTML
HTTP and
HTTPS
XHTML
What happens to your data when it is encrypted?
It is
compressed, renamed, and archived.
It is
transferred to a third party, encoded, then sent back.
It
is scrambled to retain privacy from third-parties.
It is sent
through a series of supercomputers to be compressed multiple times.
Which of the following is collection of Internet-connected programs communicating with other similar programs in order to perform tasks?
Malware
Trojan
horse
Spyware
Botnet
If cookies with non-random sequence numbers are issued upon authentication, which of the following attack types can occur?
Session
hijacking
Cross-site
scripting
SQL
injection
Directory
traversal
Modern secure password storage should implement:
Salted
plain-text values of the password
Hashed
values of the password
Plain-text
passwords stored in an encrypted database
Salted
and hashed values of the password
What two main categories of network topologies are there?
Close and
Distant
Direct and
Indirect
Physical
and logical.
Digital and
Topological
What is one way that a web browser is vulnerable to breaching?
A virus can
be sent through the monitor.
A
browser plugin can be exploited.
Web
browsers are impervious to exploitation.
A browser
can be infected by closing it.
What is another name for an insecure plugin?
Software
Firmware
Malware
Hardware
True of False? Malware exists which affects both Windows and Linux systems.
True
False
In which of the following fraud methods is a legitimate/legal-looking email sent in an attempt to gather personal and financial information from recipients?
Masquerading
Malware
Virus
Phishing
Can a proxy be used as a firewall? If so, how?
No. All a
proxy does is re-rout Internet traffic, and thus all the malicious signals that
go with it.
No. Proxies
are firewalls that are maintained at locations other than that of the user.
No. Proxies
are data encryption stations whose sole purpose is to encrypt and re-rout data.
Yes.
A proxy acts as a network intermediary for the user that serves to control the
flow of incomming and outgoing traffic.
A digital signature scheme consists of which of the following typical algorithms ?
Signature
verifying algorithm
Key
generation algorithm
Signing
algorithm
Key
generation, Signing and Signature verifying algorithm
Which of the following is TRUE about TLS?
The message
that ends the handshake sends a hash of all the exchanged handshake messages
seen by both parties
The HMAC
construction used by most TLS cipher suites is specified in RFC 2104
All
of the given options are correct
Provides
protection against a downgrade of the protocol to a previous (less secure)
version or a weaker cipher suite
Which of the following are the basic functionalities of the IPsec Protocol ?
Security
protocols for AH and ESP
Manual and
automatic key management for the internet key exchange
All
of the given options are correct
Security
association for policy management and traffic processing
Which of the following involves submitting as many requests as possible to a single Internet computer or service, overloading it and preventing it from servicing legitimate requests?
Masquerading
Distributed
denial-of-service attacks
Phishing
Backdoor
Which is the best way a system can be hardened?
Installing
a commercial security suite.
Virus
scanning only.
White-list
ad filtering only.
Total
disk encryption coupled with strong network security protocols.
Why is it crucial to encrypt data in transit?
So you can
increase your chances of testing your encryption capabilities.
To assure
that all of your information cannot be decrypted.
To decrease
your resources.
To
prevent unauthorized access to private networks and sensitive information
during its most vulnerable state.
Is true that HTTP is an insecure protocol?
True
False
Which of the following is TRUE about SSL 3.0?
SSL
3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for
certificate authentication
It has a
weak MAC construction that uses the MD5 hash function with a secret prefix
It assumes
a single service and a fixed domain certificate, which clashes with the standard
feature of virtual hosting in Web servers
Identical
cryptographic keys are used for message authentication and encryption
What is a computer virus?
A virus is
the same as a cookie in that it is stored on your computer against your
permission.
A virus is
friendly software that is simply mislabled.
Malicious
software that merely stays dormant on your computer.
Malicious
software that inserts itself into other programs.
Which of the following symmetric keys can be derived from Symmetric master key?
Data
encryption keys
Key
wrapping keys
All
of the given options are correct
Authentication
keys
What is a firewall?
A firewall
is a program that encrypts all the programs that access the Internet.
Firewalls
are network-based security measures that control the flow of incoming and
outgoing traffic.
Firewalls
are interrupts that automatically disconnect from the internet when a threat
appears.
A firewall
is a program that keeps other programs from using the network.
Which of the following is valid difference between a Virus and a Spyware ?
Virus
damages data, Spyware steals sensitive private information
Virus
damages data and also steals sensitive private information
Spyware
damages data, Virus steals sensitive private information
Spyware
damages data and also steals sensitive private information
Which of the following are valid Cryptographic key types?
Private
signature key
All
of the given options are correct
Public
authentication key
Public
signature verification key
Digital signatures provide which of the following ?
Non-repudiation
authentication
integrity
protection
All
of the given options are correct
Which of the following are possible security threats?
All
of the given options are correct
Masquerading
Backdoors
Illegitimate
use
What happens during the TCP attack; Denial of Service?
A worm is
loaded onto the victims computer to disable their keyboard.
A virus is
sent to disable their dos prompt.
Viruses are
sent to their ISP to deny them tech support.
Information
is repeatedly sent to the victim to consume their system resources, causing
them to shut down.
Which of the following is the collective name for Trojan horses, spyware, and worms?
Spware
Botnets
Virus
Malware
In which of the following protocols does a website (if accessed using the protocol) encrypt the session with a Digital Certificate?
TCP
XHTTP
HTTPS
SHTTP
Who was TLS defined by?
NSA
Internet
Engineering Task Force
OSHA
The DEA
How to avoid Man-in-the-middle attacks?
Use
HTTPS connections and verify the SSL certificate
Use connections
without SSL
Accept
every SSL certificate, even the broken ones
What is network topology?
It is the
inner networkings of a single computer.
It is the
top layer of a computer network.
It is the
entirety of the data of a computer network.
It
is the framework of the components of a computer network.
What is Internet Protocol Security?
Ways to
disconnect your router in an emergency.
Methods to
secure a disconnected computer.
Methods to
secure your documents from physical breaches.
Methods
to secure Internet Protocol (IP) communication.
What does TCP mean?
Total
Content Positioning
Technical
Control Panel
Transmittable
Constant Protocol
Transmission
Control Protocol
Which of the following is a valid Internet Security requirement?
All
of the given options are correct
Integrity
Authentication
Confidentiality
What is another name for Internet Layer?
TCP layer
IP
layer
SSL layer
Interwebs
Trojan Horse programs operate with what intent?
To do a
series of brute force attacks within the system itself and a series of external
attacks from other servers.
To
masquerade as non-malicious software while exploiting a system's weaknesses.
To slowly
but surely infect and become your operating system until the system crashes.
To openly
exploit a systems weaknesses until the user discovers it.
Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer?
Virus
Spware
Botnets
Trojan
Horse
Which of the following is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management Infrastructure (PMI)?
X.507
X.519
X.508
X.509
If you set up a BUS network, what is the major disadvantage?
It is
connected in a star pattern and can be disabled by disrupting one data center.
It is
entirely wireless and open to wifi-based attacks.
It
is linked with a single cable which can be a major vulnerability.
It is
daisy-chained together with several cables.
What does the acronym BEAST mean in Beast Attack?
Browser
Exploit Against SSL/TLS
Breach
Entering Against SSL/TLS
Browser
Extension And SSL/TLS
Breaking
and Entering Against SSL/TLS
Why is a virtual machine considered a sandboxing method?
Virtual
machines all have firewalls, virus scanners, and proxy connetions.
Virtual
machines all have sandbox features installed on them.
All
host resources are channeled through the emulator.
Virtual
machines take the brunt of the attack, so the user is always safe.
Which of the following is a valid flaw of SSL 2.0 ?
Identical
cryptographic keys are used for message authentication and encryption
All
of the given options are correct
It has a
weak MAC construction that uses the MD5 hash function with a secret prefix
It does not
have any protection for the handshake
Which of the following is true about Public Key Encryption?
Only one
person can encrypt with the public key and anyone can decrypt with the private
key
Anyone
can encrypt with the public key, only one person can decrypt with the private
key
Anyone can
encrypt with the private key, only one person can decrypt with the public key
Anyone can
encrypt with the public key and anyone can decrypt with the private key
An SQL injection is often used to attack what?
Servers
running SQL databases similar to Hadoop or Hive.
Small scale
machines such as diebold ATMs.
Servers
built on NoSQL
Large-scale
SQL databases such as those containing credit card information.
Which of the following type of attack can actively modify communications or data?
Neither
Active nor Passive attack
Passive
attack
Both Active
and Passive attack
Active
attack
How are port numbers categorized?
Unknown,
unregistered, invalid
Well-known,
registered, and static/dynamic.
Static,
dynamic, enigmatic
Known,
well-known, unknown
Which of the following keys are used to generate random numbers?
Asymmetric
random number generation keys
Public
signature verification key
Symmetric
random number generation keys
Symmetric
and asymmetric random number generation keys
When is encrypted data the safest?
When it is being
transferred via usb stick.
When
it is at rest.
When it is
being written.
When it is
in transit.
What is largely considered the most advanced computer virus?
agent.biz
Conficker
Virus
Stuxnet.
Zeus
Secure Sockets Layer is a predecessor of which cryptographic protocol?
HTTPS
IPSec
Transport
Layer Security
SSL 3.0
What are the two primary classifications of cross-site scripting?
non-persistent
and persistent.
traditional
and non-persistent
traditional
and DOM-based
DOM-based
and persistent
According to OWASP what is the most dangerous web vulnerability?
Security
Misconfiguration
Cross-site-scripting
(XSS)
Sensitive
Data Exposure
Cross-Site
Request Forgery (CSRF)
Injections
(SQL, LDAP, etc)
Which version of TLS is vulnerable to BEAST exploit?
TLS
1.0
TLS 0.5
TLS 2.0
TLS 3.0
TLS 1.1
Sandboxing does what to computer programs?
Sandboxes
protect your programs by isolating all the other programs except the one you
are using at the time.
Sandboxing
protects your system by trapping all the viruses.
It
separates and isolates them.
Sandboxing
doesn't protect your system.
Which of the following is a VALID authorization key?
Public
authorization key
Symmetric
authorization keys
Public
ephemeral key authorization key
Asymmetric
authorization keys
Which of the following threats corresponds with an attacker targeting specific employees of a company?
Spear
phishing
Phishing
Man-in-the-middle
Pharming
How can cookies be used to mitigate cross-site scripting?
Cookies
store an exact mirror copy of all a users web activity.
Cookies can
be coded like a program to intercept script attacks.
They can't.
Cookies only store user information.
Cookies
allow for cookie-based user authentication.
What does a cryptographic key do within the Internet Layer?
It
specifies how encrypted data is transferred and to whom.
It is the
specialized dataset that is able to decrypt cyphertext.
It
specifies how transferred information is converted into cyphertext.
It converts
it into encrypted language.
Which of the following keys are the private keys of asymmetric (public) key pairs that are used only once to establish one or more keys ?
Asymmetric
random number generation keys
Public
ephemeral key agreement key
Symmetric
random number generation keys
Private
ephemeral key agreement key
Which of the following is a VALID digital signature key?
Private
signature key
Private
signature authentication key
Public
signature authentication key
Symmetric
signature authentication key
Which of the following represents a cryptographic key that is generated for each execution of a key establishment process ?
Public
authentication key
Private key
transport key
Private
ephemeral key agreement key
Public
signature verification key
What is the less secure AES encryption mode?
OCB
ECB
CTR
CBC
CFB
Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
Symmetric
random number generation keys
Asymmetric
random number generation keys
Public
signature verification key
Symmetric
key wrapping key
Which of the following represents a cryptographic key that is intended to be used for a long period of time?
Private key
transport key
Public
signature verification key
Public
authentication key
Private
static key agreement key
What is a method to fend off a Sockstress attack?
White-listing
access to TCP services on critical systems.
Prepare a
retaliatory DDOS attack.
Do nothing.
It will pass on its own.
Black-listing
access to TCP services on critical systems.
Which of the following enables secure and private data exchange/transfer on an unsecure public network ?
All of the
given options are correct
Private Key
Infrastructure
Virtual Key
Infrastructure
Public
Key Infrastructure
Which of the following is a VALID ephemeral key?
Public
ephemeral key agreement key
Public ephemeral
verification key
Symmetric
ephemeral random number generation keys
Asymmetric
ephemeral random number generation keys
Which of the following HTTP method is considered insecure ?
POST
DELETE
GET
TRACE
What does the Linux kernal use to sandbox running programs?
Linux
doesn't sandbox because it is impervious to any and all cyber attacks.
seccomp,
or Secure Computing Mode
Linux uses
a layered system of user authentication to perform sandbox-like functions.
Linux
drives are fully encrypted, thus they don't need sandboxing.
Which of the following is not a VALID type of firewall?
Circuit-level
gateways
Application-level
gateways
Proxy
Server Gateways
Packet
filters
Which of the following are the public keys of asymmetric key pairs that are used to encrypt keys using a public key algorithm ?
Private
signature key
Public
authentication key
Public
signature verification key
Private
key transport key
Which of the following are the public keys of asymmetric (public) key pairs that are used to encrypt keys using a public key algorithm?
Private key
transport key
Private
signature key
Public
signature verification key
Public
key transport key
In the sublayer of which of the following does TLS and SSL performs the data encryption of network connections?
application
layer
session
layer
Both
session and presentation layer
presentation
layer
All of the following are valid cryptographic hash functions EXCEPT:
RC4
RIPEMD
SHA-512
MD4
Which of the following is a standalone computer program that pretends to be a well-known program in order to steal confidential data ?
Fraudtool
Malware
SPWare
Spyware
Virus
Subscribe to:
Posts (Atom)