Introduction To Cyber Attacks - Home - Coursera
Introduction To Cyber Attacks - Home - Coursera
Module 1 Quiz
Quiz, 10 questions
1/1
point
1.
A malicious worm program is characterized by the following fundamental attribute:
Correct
Correct! A worm program is characterized by the ability to propagate automatically without the assistance of
a human being.
0/1
point
2.
Embedding a trap door into a login program results in which of the following:
A trap door program with the potential to lock out authorized users
https://www.coursera.org/learn/intro-cyber-attacks/exam/bLFCT/module-1-quiz 1/6
12/22/2018 Introduction to Cyber Attacks - Home | Coursera
A Trojan horse
0/1
point
3.
Learning the incredibly easy, but devastatingly e ective techniques for hacking an old soda machine is instructive,
because it exempli es which of the following properties of cyber security?
1/1
point
4.
Which of the following statements is true?
Correct
Correct! Developers might write dirty source code which would result in dirty code from a clean compiler.
https://www.coursera.org/learn/intro-cyber-attacks/exam/bLFCT/module-1-quiz 2/6
12/22/2018 Introduction to Cyber Attacks - Home | Coursera
1/1
point
5.
Cyber adversary motivation does not include which of the following:
Curiosity
Money
Politics
Fame
Correct
Correct! All the listed examples are clearly found as motivations for cyber adversaries.
1/1
point
6.
Remote exploitation of an unaltered vehicle by hackers is enabled by which of the following design decisions:
Correct
Correct! Each of the vehicle design decisions listed contribute to the vulnerabilities exploited by hackers.
1/1
point
https://www.coursera.org/learn/intro-cyber-attacks/exam/bLFCT/module-1-quiz 3/6
12/22/2018 Introduction to Cyber Attacks - Home | Coursera
7.
Module 1 Quiz
Which of the following is a reasonable conclusion that one might draw by studying Unix kernel attacks such as the old
IFS10
Quiz, exploit?
questions
Correct
Correct! The ability to freely peruse the source code of an OS kernel can be valuable in the design of an
e ective attack.
0/1
point
8.
The root cause of some discovered cyber security vulnerability might reasonably be which of the following:
1/1
point
9.
Bu er over ow attacks might best be avoided by which of the following preventive approaches:
https://www.coursera.org/learn/intro-cyber-attacks/exam/bLFCT/module-1-quiz 4/6
12/22/2018 Introduction to Cyber Attacks - Home | Coursera
Correct
Correct! Strong type enforcement reduces the likelihood that declared variables might be stu ed with values
that do not t the de ned type.
1/1
point
10.
The integrity threat can be exempli ed by which of the following scenarios:
Customer records were hidden, but one might have been slightly garbled
Correct
Correct! If any data has its correctness or validity degraded in any way, then an integrity threat has been
realized.
https://www.coursera.org/learn/intro-cyber-attacks/exam/bLFCT/module-1-quiz 5/6
12/22/2018 Introduction to Cyber Attacks - Home | Coursera
https://www.coursera.org/learn/intro-cyber-attacks/exam/bLFCT/module-1-quiz 6/6