MSMC CIT 4610 - CIT 460 REVIEW QUESTIONS

Unformatted text preview:

Mount Saint Mary College, Newburgh NYNetwork Security Spring 2010CIT461 Review QuestionsNetwork Security Review questions sp10.wpdNTC Feb 6, 2010Week 3 - Security Threats; Ciphers1. Describe the distinguishing characteristics of each of the followinga. Macro virusesb. File Infectorsc. Boot-record infectorsd. polymorphic virusese. stealth viruses f. trojan horsesg. logic bombsh. worms2. Describe the basic idea behind each of the followinga. Buffer overflow attacksb. SYN attackc. Teardrop attackd. smurf attacke. back doorf. spoofingg. man-in-the-middleh. replayi. hijackingj. fragmentation attack3. How are strong keys best generated?4. What kind of attacks are keys containing only alphabetic characters subject to?5. What kind of attacks are random keys, containing any kind of characters, subject to?6. What is the basis for a mathematical attack? 7. Give some examples of social engineering attacks.8. Why does port scanning represent a threat? 9. What is meant by ‘Dumpster diving‘?10. What are Birthday attacks made against? 11. What do Birthday attacks try to do? 12. What is the difference between a brute force password attack and a dictionarypassword attack?13. What is meant bya. Software exploitationb. Eavesdroppingc. TCP Sequence number attacks14. Describe the difference between virus scanning and virus prevention. 15. Describe what is meant by anomaly detection. Misuse detection.16. What are the three responses to intrusion detection? 17. Describe the difference statistical anomaly detection and signature anomalydetection18. What kind of IDS needs a NIC to be placed in promiscuous mode? 19. Describe the three types of signaturesa. StringMount Saint Mary College, Newburgh NYNetwork Security Spring 2010CIT461 Review QuestionsNetwork Security Review questions sp10.wpdNTC Feb 6, 2010b. Port c. Header-Condition 20. What are the four characteristics of host-based IDSs mentioned in the text? 21. Which is more common, signature or behavior (statistical) based IDSs? 22. Name a disadvantage of statistical based IDSs. 23. Describe how a signature based IDS works. 24. What system parameters does a statistical anomaly based IDS use to define a‘normal’ usage profile for the system? 25. What is the purpose of a


View Full Document

MSMC CIT 4610 - CIT 460 REVIEW QUESTIONS

Documents in this Course
Load more
Download CIT 460 REVIEW QUESTIONS
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CIT 460 REVIEW QUESTIONS and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CIT 460 REVIEW QUESTIONS 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?