Beruflich Dokumente
Kultur Dokumente
Student Name : NUR AIDAH NAZIRAH BINTI Student ID: 2016234294 Group: CS105A
ABDUL KADIR
2. ________ is the process of reviewing logs, records, and procedures to determine whether they
meet the computer security standard.
A. Auditing
B. Phreaking
C. Examining
D. Non-repudiation
4. Choose the BEST answer in recommending a security approach for a small organization that has
budget constraint and inexperienced network administrators.
A. Hybrid security approach
B. Passive security approach
C. Layered security approach
D. Perimeter security approach
5. In __________ attack, router does not have to be compromised in other to execute the attack.
A. Smurf
B. SYN Flood
C. ICMP Flood
D. Distributed Reflection Denial of Service
6. “An attacker sends an extreme number of packets to a server so that it can no longer
communicate adequately with its legitimate users”
This above statement refers to ______________ type of attack.
A. Intrusion
B. Blocking
C. Malware
D. Hijacking
7. Which approach to security not only secures the system perimeter but also secures individual
systems within the network?
A. Layered security approach
B. Perimeter security approach
C. Passive security approach
D. Hybris security approach
8. Ahmad uses utilities downloaded from the Internet to illegally penetrate into a remote server. In
that situation Ahmad is a ________________.
A. White Hat Hacker
B. Black hat Hacker
C. Script Kiddy
D. Cracker
End of Quiz
ITT320 – NETWORK SECURITY (MAR15-16) QUIZ 01: CHAPTER 1 & CHAPTER 2 (SET A)
9. _______ is any technique that is used to ensure that someone performing an action on a computer
cannot falsely deny that they performed the action.
A. Non-repudiation
B. Auditing
C. Logging
D. Access control
10. Which of the following method is an effective defense against a Ping of Death attack?
A. Install and update anti-virus software
B. Do not use lookback address when issuing Ping command
C. Ensure the operating system and software are routinely patched
D. Use UDP for ping command
Question 1
a. Discuss how SYN flood attacks occur. (2 marks)
b. List THREE (3) methods to defend against SYN flood attack (3 marks)
SYN Cookies
Micro Blocks
RST Cookies
Stack Tweaking
c. Give THREE (3) examples of Denial of Service Attack (DoS) attack other that SYN flood. (3 marks)
Smurf Attack
Ping of Death (PoD)
Distributed Reflection Denial of Service (DRoS)
Question 2
a. Identify and briefly explain the THREE (3) most common threats to a computer system. (6 marks)
1. Intrusion
2. Malware
3. Blocking
b. State TWO clues that can determine whether a Trojan horse or virus is present in a given system.
(2 marks)
c. How to against Trojan horse or virus Attacks? Give TWO examples. (2 marks)
Question 3
a. Briefly explain TWO (2) reasons why is it necessary for a new to undergo a security audit. (4
marks)
b. List THREE (3) information that included in packets. (3 marks)
End of Quiz