1. In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as:
A) wormnets B) trojannets C) spynets D) botnets E) rootnets F) backdoor
2. In a botnet, mailbot logs into a particular type of system for making coordinated attack attempts. What type of system is this?
A) Chat system B) SMS system C) Email system D) Log system E) Kernel system F) None of the choices.
3. Which of the following software tools is often used for stealing money from infected PC owner through taking control of the modem?
A) System patcher B) Porn dialer C) War dialer D) T1 dialer E) T3 dialer F) None of the choices.
4. Which of the following is an oft-cited cause of vulnerability of networks?
A) software monoculture B) software diversification C) single line of defense D) multiple DMZ E) None of the choices.
5. Introducing inhomogeneity to your network for the sake of robustness would have which of the following drawbacks?
A) poorer performance. B) poor scalability. C) weak infrastructure. D) high costs in terms of training and maintenance. E) None of the choices.
1. Right Answer: D Explanation: In order to coordinate the activity of many infected computers, attackers are used coordinating systems known as botnets. In a botnet, the malware or mailbot logs in to an Internet Relay Chat channel or other chat system. The attacker can then give instructions to all the infected systems simultaneously.
2. Right Answer: A Explanation: In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as botnets. In a botnet, the malware or mailbot logs in to an Internet Relay Chat channel or other chat system. The attacker can then give instructions to all the infected systems simultaneously.
3. Right Answer: B Explanation: One way of stealing money from infected PC owner is to take control of the modem and dial an expensive toll call. Dialer such as porn dialer software dials up a premium-rate telephone number and leave the line open, charging the toll to the infected user.
4. Right Answer: A Explanation: An oft-cited cause of vulnerability of networks is homogeneity or software monoculture. In particular, Microsoft Windows has such a large share of the market that concentrating on it will enable a cracker to subvert a large number of systems. Introducing inhomogeneity purely for the sake of robustness would however bring high costs in terms of training and maintenance.
5. Right Answer: D Explanation: An oft-cited cause of vulnerability of networks is homogeneity or software monoculture. In particular, Microsoft Windows has such a large share of the market that concentrating on it will enable a cracker to subvert a large number of systems. Introducing inhomogeneity purely for the sake of robustness would however bring high costs in terms of training and maintenance.
Leave a comment