CSE 4471 Final Exam Questions and Answers 100% Pass
Internet Control Message Protocol. It is used by network devices to send error messages
indicating, for example, that a requested service is not available (i.e. ping - could not find
host) Correct Ans-What does ICMP stand for and what is it?
Used by hosts, routers, gateways to communicate network-level information ■
- Error reporting: unreachable host, network, port, protocol ■
- Echo request/reply (used by ping) ■ Correct Ans-What is ICMP used for?
Autonomous Systems (AS) Correct Ans-The Global Internet consists of ____________
interconnected with each other:
Stub AS: small corporation! ■
Multihomed AS: large corporation (no transit)! ■
Transit AS: provider ■ Correct Ans-The global internet consists of these 3 AS's
- Microprocessor ■
- ROM ■
- RAM ■
- Digital signal processor ■
- Radio module ■
- Microphone and speaker ■
, CSE 4471 Final Exam Questions and Answers 100% Pass
- Hardware interfaces ■
- LCD display ■ Correct Ans-What is inside a smartphone?
Weakness or fault that can lead to an
exposure Correct Ans-define Vulnerability
Generic term for objects, people who pose a potential danger to an asset (via attacks)!
Correct Ans-define Threat
Specific object, person who poses such
a danger (by carrying out an attack) ■
DDoS attacks are a threat; if a hacker carries out a
DDoS attack, he's a threat agent Correct Ans-define Threat agent
Probability that "something bad" happens times
expected damage to the organization ■
Unlike vulnerabilities/exploits; e.g., a web service running on a server may have a
vulnerability, but if it's not
connected to the network, risk is 0 Correct Ans-define Risk
a successful attack Correct Ans-define Exposure
, CSE 4471 Final Exam Questions and Answers 100% Pass
how the attack was carried out, e.g., malicious email attachment.
a path or means by which a hacker can gain access to a computer or network server in order
to deliver a payload or malicious outcome Correct Ans-define Vector
malicious codes such as viruses, worms,
Trojan horses, bots, backdoors, spyware, adware, etc. Correct Ans-define Malware
the act of disclosing information. responsible, full, partial, none, delayed, etc. Correct Ans-
define Disclosure
determining the identity of a person,
computer, or service on a computer Correct Ans-define Authentication
determining whether an entity (person,
program, computer) has access to object
Can be implicit (email account access) or explicit (attributes specifying users/groups who can
read/write/
execute file) Correct Ans-define Authorization
definitions vary
Any attack, all attacks using vulnerability X, etc.
, CSE 4471 Final Exam Questions and Answers 100% Pass
Anything resulting in service degradation other than
problem mgmt., service request fulfillment Correct Ans-define Incident
Computer Security Institute Correct Ans-What does CSI stand for?
-Decide whether to distribute handsets to employees for
business purposes, allow use ■
- Encrypt device data ■
- Remote data wipe as needed ■
- Procure, install anti-malware, firewall products ■
- Require VPN use, strong passwords, inventory mgmt. ■
- Monitor employee handset use to detect attacks ■
- Educate employees about the threatspace, train them to ■
treat handsets as any other computer system
- Prevent, detect, and respond appropriately ■ Correct Ans-What are some risk
management tactics for mobile phones?
acts of human error or failure Correct Ans-What is the most common threat to information
security?
Employees Correct Ans-__________ are among the greatest threats to
an organization's data