CST3520 Local Privilege Escalation Quiz

CST3520 Local Privilege Escalation Quiz

Created by
@AdmirableBeryllium

Questions and Answers

What is the main focus of the threat environment as discussed in the text?

Criminal era threats

Which type of attackers are noted to be the dominant ones in today's threat landscape?

Criminals

What distinguishes cyberwar from cyberterror according to the text?

Target of attacks

Which group is highlighted for making types of attacks and cooperating in criminal activities?

<p>Criminals</p> Signup and view all the answers

What are the types of attacks discussed that criminals engage in today?

<p>Denial-of-service and social engineering attacks</p> Signup and view all the answers

What does 'confidentiality' mean in the context of security goals?

<p>Ensuring people cannot read sensitive information</p> Signup and view all the answers

What does 'integrity' aim to achieve in terms of security goals?

<p>Detecting changes in information</p> Signup and view all the answers

What is the primary focus of 'availability' as a security goal?

<p>Ensuring authorized users can access information when needed</p> Signup and view all the answers

What is the primary purpose of countermeasures in cybersecurity?

<p>Thwarting attacks and protecting against security breaches</p> Signup and view all the answers

'Compromises' in cybersecurity terminology refers to:

<p>Successful attacks or incidents that occur</p> Signup and view all the answers

In the context of security goals, what does 'prevention' as a countermeasure aim to achieve?

<p>Preventing attacks from occurring in the first place</p> Signup and view all the answers

What is a recommended technique to mitigate reconnaissance attacks?

<p>Using encryption that meets data security needs</p> Signup and view all the answers

Which of the following is NOT a practice to ensure a strong password policy?

<p>Using plaintext passwords</p> Signup and view all the answers

How can access attacks be mitigated?

<p>Practicing strong password security</p> Signup and view all the answers

What is a key principle to mitigate access attacks?

<p>Principle of minimum trust</p> Signup and view all the answers

Which tool is used to prevent sniffer attacks?

<p>Anti-sniffer tools</p> Signup and view all the answers

What is recommended to prevent continuous password attempts?

<p>Disabling accounts after unsuccessful logins</p> Signup and view all the answers

What distinguishes Trojan horses from viruses and worms?

<p>Trojan horses do not self-replicate</p> Signup and view all the answers

Which type of Trojan horse provides attackers with sensitive data like passwords?

<p>Data sending Trojan Horse</p> Signup and view all the answers

What is the purpose of a security software disabler Trojan horse?

<p>Stops antivirus programs or firewalls from functioning</p> Signup and view all the answers

How does a DoS Trojan horse affect a system?

<p>Slows or halts network activity</p> Signup and view all the answers

What is the key characteristic of a mobile code attack?

<p>Executable code on a webpage executes automatically</p> Signup and view all the answers

Which type of malware disguises itself as a useful program but provides unauthorized access to the system?

<p>Trojan Horse</p> Signup and view all the answers

What is a key feature in mitigating DoS attacks on routers and firewalls?

<p>Proper configuration of anti-spoof features</p> Signup and view all the answers

How can Ping Sweeps and Port Scans be mitigated according to the text?

<p>Mitigated using IPS at both network and host levels</p> Signup and view all the answers

What is the role of cryptography in mitigating packet sniffers?

<p>Makes communication channels cryptographically secure</p> Signup and view all the answers

What do anti-sniffer tools primarily detect?

<p>Increased traffic processing by hosts</p> Signup and view all the answers

How do anti-DoS features on routers and firewalls limit attacks?

<p>Through limits on the amount of half-open TCP connections allowed</p> Signup and view all the answers

What is the primary function of proper anti-spoof features configuration on routers and firewalls?

<p>Reducing the risk of attack by filtering spoofed packets</p> Signup and view all the answers

More Quizzes Like This

Use Quizgecko on...
Browser
Browser