Discuss differences between a virus and a trojan horse

Assignment Help Computer Engineering
Reference no: EM131723207

Question 1

Logging is a proactive mechanism to prevent
attacks.
True
False

Question 2

Address Space Randomization is yet another compile time technique to thwart buffer overflow attacks.
True
False

Question 3

The access control model of Linux is primarily a
Mandatory Access Control model.
True
False

Question 4

In Linux, the purpose of the sticky bit is to allow only owner of a file or owner of the directory in which the file is located and super user from deleting or renaming the file.
True
False

Question 5

The GC C compiler StackGuard and Microsoft Visual C++ compiler switch /GS mechanisms are defense against a buffer overflow attack.
Question 5 options:
True
False

Question 6

An insufficiently validated environment variable is a source for untrusted data to enter a program and can be exploited by an attacker.
Question 6 options:
True
False

Question 7

One reason for increased security risk in hosted virtualization systems is due to an additional layer in hypervisor in these systems.
True
False

Question 8

Windows (since 2000) have earned Common Criteria EAL4.
True
False

Question 9

(Input) Fuzzing is a technique used both by hackers and testers to discover vulnerabilities in a system.
True
False

Question 10

From a security perspective, not installing a
service or application is preferable to installing it and then disabling it.
True
False

Question 11

Routine backup does not thwart an attack but
facilitates recovering from it.
True
False

Question 12

The principle of least privilege is a good
security concept in that it minimizes privilege escalation by attackers.
True
False

Question 13

Rootkit attacks are annoyance and not
particularly dangerous because they are stealthy.
True
False

Question 14

The JAVA programming language is extremely vulnerable to buffer overflows.
True
False

Question 15

Paige Howard's token look like this on her Windows system:

User: SomeCorporationPaigeHoward

Groups: Everyone; Authenticated Users; Developers

That is, she belongs to three groups: Everyone, Authenticated Users and Developers.

Her program attempts to open a file that is not owned by for RWX (Read, Write, Execute) access, and the file has the following ACL:
Administrators: Full Control; Authenticated Users: RW; Developers: RWD
Paige (Paige's program) be allowed to access the file. T F

True
False

Question 16

A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.
Logic Bomb
Trojan horse
Worm
Trapdoor

Question 17

A ______ is a structure where data are usually saved on the stack.
guard page
stack frame
heap
NOP sled

Question 18

An essential component of many buffer overflow attacks is the transfer of execution to code, known as _______, supplied by the attacker and often saved in the buffer being overflowed.
Question 18 options:
NOP code
stack code
heap code
shellcode

Question 19

What is the most effective defense against cross-site scripting attack?
Limiting account privileges
Input validation
Encryption
User authentication

Question 20

__________ applications is a control that limits the programs that can execute on the system to just those in an explicit list.
Virtualizing
White listing
Logging
Patching

Question 21

The range of logging data acquired should be determined _______.
during security testing
as a final step
after monitoring average data flow volume
during the system planning stage

Question 22
1. Describe the similarities and differences between a virus, a Trojan horse, and a worm.
2. Explain controls or steps one can take to mitigate their threat.
(Note: This question will be graded by the professor.)

Reference no: EM131723207

Questions Cloud

Construct time-current characteristics to show coordination : Construct time-current characteristics to show coordination between the substation breaker, recloser, and the fuse on the last lateral
Demonstrate graduate school level of writing : Demonstrate graduate school level of writing, with clear, concise scholarly writing, free of grammatical, spelling, and punctuation errors.
What was the one-month eurodollar deposit rate : What was the one-month Eurodollar deposit (London) rate for the latest week reported in this data source? What was the latest prime rate reported?
Bubble tea vendor in west virginia coast : As you know we are the only Bubble Tea vendor in West Virginia's coast. Right now we are charging a price of $4 per bubble tea to all our customers.
Discuss differences between a virus and a trojan horse : Describe the similarities and differences between a virus, a Trojan horse, and a worm
Who were the top arrangers by volume : If you wanted to know more about the details of business loans, you might visit www.loanpricing.com. Go there and click on the link for the most recent.
Federal reserve note into the federal reserve : If you turned in a Federal Reserve note (cash) into the Federal Reserve what would they give you for this IOU? What backs the U.S. money supply?
Write one page about affordable green housing : Write one page about affordable green housing, -What are the social/economic/environmental/technological issues at play?
Write paper on an environmental impact analysis as assigned. : Write a minimum length of two-page paper utilizing syllabus term paper formatting on an environmental impact analysis as assigned.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd