Sie sind auf Seite 1von 2

ITT320 – NETWORK SECURITY (MAR15-16) QUIZ 01: CHAPTER 1 & CHAPTER 2 (SET A)

Student Name : NUR AIDAH NAZIRAH BINTI Student ID: 2016234294 Group: CS105A
ABDUL KADIR

QUIZ 01: SET A


1. Choose which of the following is a spyware.
A. Adware
B. Code Red
C. Key Logger
D. Social Engineering

2. ________ is the process of reviewing logs, records, and procedures to determine whether they
meet the computer security standard.
A. Auditing
B. Phreaking
C. Examining
D. Non-repudiation

3. Attackers launch a block attack for the purpose of _______________.


A. Break into a target system
B. Install a virus on a target machine
C. Get sensitive data and information
D. Prevent legitimate users from accessing the system

4. Choose the BEST answer in recommending a security approach for a small organization that has
budget constraint and inexperienced network administrators.
A. Hybrid security approach
B. Passive security approach
C. Layered security approach
D. Perimeter security approach

5. In __________ attack, router does not have to be compromised in other to execute the attack.
A. Smurf
B. SYN Flood
C. ICMP Flood
D. Distributed Reflection Denial of Service

6. “An attacker sends an extreme number of packets to a server so that it can no longer
communicate adequately with its legitimate users”
This above statement refers to ______________ type of attack.
A. Intrusion
B. Blocking
C. Malware
D. Hijacking

7. Which approach to security not only secures the system perimeter but also secures individual
systems within the network?
A. Layered security approach
B. Perimeter security approach
C. Passive security approach
D. Hybris security approach

8. Ahmad uses utilities downloaded from the Internet to illegally penetrate into a remote server. In
that situation Ahmad is a ________________.
A. White Hat Hacker
B. Black hat Hacker
C. Script Kiddy
D. Cracker

End of Quiz
ITT320 – NETWORK SECURITY (MAR15-16) QUIZ 01: CHAPTER 1 & CHAPTER 2 (SET A)

9. _______ is any technique that is used to ensure that someone performing an action on a computer
cannot falsely deny that they performed the action.
A. Non-repudiation
B. Auditing
C. Logging
D. Access control

10. Which of the following method is an effective defense against a Ping of Death attack?
A. Install and update anti-virus software
B. Do not use lookback address when issuing Ping command
C. Ensure the operating system and software are routinely patched
D. Use UDP for ping command

Question 1
a. Discuss how SYN flood attacks occur. (2 marks)

SYN Flood attack occurs by exploiting the TCP handshake process.


 First, the client sends a SYN packet to the server in order to initiate the connection.
 The server than responds to that initial packet with a SYN/ACK packet, in order to
acknowledge the communication.
 Finally, the client returns an ACK packet to acknowledge the receipt of the packet from the
server. After completing this sequence of packet sending and receiving, the TCP connection is
open and able to send and receive data.

b. List THREE (3) methods to defend against SYN flood attack (3 marks)
 SYN Cookies
 Micro Blocks
 RST Cookies
 Stack Tweaking

c. Give THREE (3) examples of Denial of Service Attack (DoS) attack other that SYN flood. (3 marks)
 Smurf Attack
 Ping of Death (PoD)
 Distributed Reflection Denial of Service (DRoS)

Question 2
a. Identify and briefly explain the THREE (3) most common threats to a computer system. (6 marks)
1. Intrusion

2. Malware

3. Blocking

b. State TWO clues that can determine whether a Trojan horse or virus is present in a given system.
(2 marks)
c. How to against Trojan horse or virus Attacks? Give TWO examples. (2 marks)

Question 3
a. Briefly explain TWO (2) reasons why is it necessary for a new to undergo a security audit. (4
marks)
b. List THREE (3) information that included in packets. (3 marks)

End of Quiz

Das könnte Ihnen auch gefallen