Quiz 5 - CS690 A1 Network ..
Quiz 5 - CS690 A1 Network ..
CS690 A1 Network Security (Fall 2022) Assessments Review Test Submission: Quiz 5
Which of the following are true about TCP Reset Attacks? (Select all that apply.)
Which of the following are true about Phishing or Spear Phishing. (Select All that
apply.)
Selected b.
Answers: Education is the most effective method for preventing successful
Phishing attacks.
https://learn.bu.edu/webapps/assessment/review/review.jsp?attempt_id=_22874459_1&course_id=_89682_1&content_id=_10972705_1&return_content=1&step= 1/7
20/11/2022, 16:25 Review Test Submission: Quiz 5 – CS690 A1 Network ...
c.
Checking the message header information can help determine if a
message ought to be trusted.
Answers: a.
Spear Phishing only targets executives or high-ranking people.
b.
Education is the most effective method for preventing successful
Phishing attacks.
c.
Checking the message header information can help determine if a
message ought to be trusted.
d.
It uses known code vulnerabilities to exploit to a network or system.
Select the statements that are true about E-mail. (Select all that apply.)
Which of the following are true about trusted or untrusted clouds? (Select all that
apply.)
Selected a.
Answers: BBS Proxy Re-encryption is used to enable access control to cloud
resources without divulging credentials to the cloud.
b.
Challenge-response is used to ensure data is stored in the cloud.
d.
https://learn.bu.edu/webapps/assessment/review/review.jsp?attempt_id=_22874459_1&course_id=_89682_1&content_id=_10972705_1&return_content=1&step= 2/7
20/11/2022, 16:25 Review Test Submission: Quiz 5 – CS690 A1 Network ...
Open Authentication is a protocol used to grant temporary access to
cloud resources.
Answers: a.
BBS Proxy Re-encryption is used to enable access control to cloud
resources without divulging credentials to the cloud.
b.
Challenge-response is used to ensure data is stored in the cloud.
c.
There is no mechanism to prevent other cloud clients from
intercepting data during computation.
d.
Open Authentication is a protocol used to grant temporary access to
cloud resources.
Response Wang 7.1-7.5. There are several methods for secure multi-party
Feedback: computation including garbled circuits. Challenge-response is used
to validate that data has been stored on the cloud. BBS Proxy Re-
encryption is used to enable access control to cloud resources
without divulging credentials to the cloud provider. OAuth is used to
grant temporary access to cloud resources.
Where are Honey Pots commonly deployed? (Select all that apply.)
Which of the following is only able to replicate itself by embedding itself in files or
disk master boot blocks?
b. Virus
c. Spyware
d. Worm
Response Module 5 Notes. Viruses need a host file or master boot block to
Feedback: infect and spread. A Trojan horse is any program that presents as
one thing but also contains a malicious payload such as spyware or
Malware. Worms do not require host files to infect.
https://learn.bu.edu/webapps/assessment/review/review.jsp?attempt_id=_22874459_1&course_id=_89682_1&content_id=_10972705_1&return_content=1&step= 3/7
20/11/2022, 16:25 Review Test Submission: Quiz 5 – CS690 A1 Network ...
Selected b.
Answer: An IPS is placed “in-line” so that traffic must flow through it to
enter or leave the network.
b.
An IPS is placed “in-line” so that traffic must flow through it to
enter or leave the network.
d.
An IDS system can proactively drop traffic it suspects is
malicious.
Response Module 5 Notes. IDS do not drop traffic. IPS can drop traffic. DPI
Feedback: inspects all parts of the packet including the IP header. Because
and IPS is designed to drop malicious traffic, it is placed inline so
that traffic must pass through it.
Which of the following techniques can deep packet inspection use to detect
malicious activities? (Select all that apply.)
Which of the following are true about cloud-based services? (Select all that
apply.)
https://learn.bu.edu/webapps/assessment/review/review.jsp?attempt_id=_22874459_1&course_id=_89682_1&content_id=_10972705_1&return_content=1&step= 4/7
20/11/2022, 16:25 Review Test Submission: Quiz 5 – CS690 A1 Network ...
d.
SaaS reduces the expense, time, and labor resources involved in
maintaining an application.
Answers: a.
IaaS providers support operating systems and applications hosted
on their systems.
b. Microsoft Office 365 is an example of a SaaS product.
c.
They can reduce the initial investment and time involved in standing
up a new system or service.
d.
SaaS reduces the expense, time, and labor resources involved in
maintaining an application.
Which of the following could indicate that a received message is a forgery or has
been modified? (Select all that apply.)
Why is HIDS an important part of a Defense in Depth strategy? (Select the best
answer.)
Selected c.
Answer: It can monitor the state and performance of the local system and
detect malicious software from damaging the system.
Answers: a.
It can monitor traffic flow through a router or probe to identify
abnormal traffic.
https://learn.bu.edu/webapps/assessment/review/review.jsp?attempt_id=_22874459_1&course_id=_89682_1&content_id=_10972705_1&return_content=1&step= 5/7
20/11/2022, 16:25 Review Test Submission: Quiz 5 – CS690 A1 Network ...
b.
It validates website input to prevent exfiltration of data from the
network.
c.
It can monitor the state and performance of the local system and
detect malicious software from damaging the system.
c. Man-in-the-middle
Which of the following are actions that should be taken to correct XSS
vulnerabilities. (Select all that apply.)
https://learn.bu.edu/webapps/assessment/review/review.jsp?attempt_id=_22874459_1&course_id=_89682_1&content_id=_10972705_1&return_content=1&step= 6/7
20/11/2022, 16:25 Review Test Submission: Quiz 5 – CS690 A1 Network ...
Which of the following vulnerabilities are frequently found in web sites? (Select all
that apply.)
← OK
https://learn.bu.edu/webapps/assessment/review/review.jsp?attempt_id=_22874459_1&course_id=_89682_1&content_id=_10972705_1&return_content=1&step= 7/7