CST8230 - Midterm (With Answers)
CST8230 - Midterm (With Answers)
Corrector
Mid-Term Exam
Date: November 5
45 minutes
Name: ____________________________________________
Student #: _________________________________________
Signed: ___________________________________________
Section A – Multiple Choice Questions
1. Based on the highlighted portion of the captured packet below, what protocol is being
carried as payload within this IP packet?
A - IP
B - UDP (0x11 -> 17 thus UDP)
C - TCP
D - ICMP
E - None of the above
3. It is possible to capture packets from the network that are not destined for your machine.
A - False
B - True (that’s what promiscuous mode is for!)
5. During a packet capture, you notice a couple of TCP packets with the “F” flag and some “A”
flags. What is most likely going on?
A- A risk
B- A compromise
C- A hole
D- A fault
E- A vulnerability
7. If you run password crackers or packet sniffers at work, which of the following is true?
A- Passive reconnaissance
B- Active reconnaissance
C- Countermeasure
D- Denial of Service
E- Preliminary reconnaissance
9. The Data ____ is the person having responsibility and authority for data, while the Data
___ is the entity temporarily accessing and/or modifying the data.
A- Custodian, Owner
B- Owner, Manager
C- Owner, Custodian
D- Manager, Custodian
E- Administrator, Manager
10. Based on the highlighted portion of packet code below, what protocol is being used?
A - TCP
B - ICMP
C - UDP
D - ARP
E - None of the above (indicates IPv4 and 20-byte header)
14. When using a packet sniffer, such as TCPDump, what parts of the packet can you examine
through the software?
A - IP header content
B - Protocol header (TCP, UDP, ICMP, etc) content
C - Payload
D - A and B only
E - A, B & C
A- Security
B- Accountability (part of the security functions, not goals)
C- Ease of Use
D- Functionality
E- They are all Security Goals
16. Your system receives a few packets, but no connection seems to be established. When
you look at the logs, you notice you received a few SYN packets, immediately followed by
RST packets, but no ACK packets. What’s could be happening?
18. Which of the following is considered typical reasons why hackers attack systems?
A - Profit
B - Religious / political / ethical reasons
C - “Mount Everest” syndrome
D - Revenge
E - All of the above
19. In the CIA Triad, ____ is responsible for ensuring that legitimate users maintain access to
information and resources, they need access to.
A - Accountability
B - Authentication
C - Integrity
D - Confidentiality
E - Availability
A- Cracking
B- Illegal information warfare activity
C- Non-Technical hacking
D- Technical hacking
E- All of the above
21. A ___ attaches itself to a program or file so it can spread from one computer to another
with the file as it travels, leaving infections as it travels.
A- Worm
B- Virus
C- Trojan
D- Rootkit
E- None of the above
22. How did Vince, the Physical Security Expert mentioned in the “No Tech Hacking” movie,
manage to enter the secure building ... What specifically did he do and what did he use to
do it?
A- Session captures
B- Connection control flags
C- UDP packets
D- TCP/IP shutdown session
E- Trust relationship
25. The TCP three-way handshake used to open a TCP connection uses 3 packets.
What 2 flags are required to be set across these 3 packets? (Select all that apply)
26. Which one of the tools below can be used as an effective vulnerability scanner?
27. A closed port will respond to a SYN Packet with a(n) RST packet
A- True (has to, as per RFP, since there’s nothing to respond to the request)
B- False
28. Computer A wishes to open a TCP session with Computer B. If Computer A's initial
sequence number is 145678913, then Computer B will respond with:
29. From the perspective of Risk Management, security can be defined as:
A- Ensuring the company so that security incidents don’t cost the organization a lot.
B- Reducing / minimizing the risks to the organization and its assets to an acceptable level.
C- Protecting the organization’s assets
D- All of the above
E- None of the above
30. The loss of one of the goals of security through an incident is known as a:
A- Hole
B- Vulnerability
C- Risk
D- Compromise
E- Threat
A- IGRP
B- TCP
C- UDP
D- FTP
E- None of the above
33. Each TCP connection on a given system can be uniquely identified by:
34. ___ spread from computer to computer, but unlike other malware, it has the ability to travel
and replicate itself without any user intervention.
A- Worm
B- Trojan
C- Virus
D- Rootkit
E- None of the above
35. Which one of the following is NOT a fundamental principle of the Computer Security Triad?
A - Confidentiality
B - Ease of Use
C - Availability
D - Integrity
E - Accountability
Section B – Short Answers
Threat:
- something that could cause a security issue if allowed to get in (e.g. virus, hacker, etc)
- doesn’t have any “Teeth” without a vector/vulnerability to allow it to manifest
- external to system, may be internal or external to security environment
Vulnerability:
- a potential security hole that may exist on the system and needs to be shored
up/protected against or patched to ensure it isn’t exploited by a threat
- So long as it exists, the risk of exploit/compromise exists
- Internal to system/security environment
2. Define the term and process of “active reconnaissance” & give some examples.
The goal is to gather more direct information while remaining unseen, looking to improve
the quality and depth of passive recon information unearthed while still threading lightly (without
setting off too many security alarms).
Visibility becomes a possibility at this level (not as covert), since it is done using methods &
tools that might potentially trigger security responses, but the intent remains to be as
unobtrusive and invisible as possible.
Examples include: Probing and scanning to find systems and vulnerabilities; searching for
non-public, protected or privileged information; system profiling; war dialing/driving;
hacking; social engineering the target; etc…
Every security object (user, process, resource, etc) should only be assigned the minimum
permissions/access required to be able to accomplish its assigned task(s), no more.
4. What are the 3 main types/areas of security, excluding Safety? Give a bit of detail to explain each
one.
A. System Security
i) Protection of information, capabilities and services on a system/server
ii) SANs, servers, desktops, network devices, etc…
B. Communication Security
i) Protection of information while it’s being transmitted
ii) Also includes protection of the medium itself (in so far as it’s possible)
C. Physical Security
i) Protection from physical access to computer, communications equipment, facilities and
personnel from damage or theft
ii) All logical security controls must include physical security
5. Explain why physical security has become a necessary and integral part of IT/IS Security.
Without proper physical security, you can’t protect systems from direct physical access,
theft and/or physical damage. If the enemy has direct access to the hardware/information,
they can take their time, use a much broader set of skills & tools to breach any security AND do
it at their leisure.
Then there’s the “building access” issue, which could lead to above. Even if they can’t
get to the hardware or info, having access means they might be able to gain insider knowledge
of how the company operates and gain invaluable information for escalating access.
Add industrial spying and associated abilities, and any direct line of sigh access can be
considered a major security risk/breach.