177. Ping-of-death is an example of which of the following?
a. Keyboard attack
b. Stream attack
c. Piggyback attack
d. Buffer overflow attack
A keyboard attack is a resource starvation attack in that it consumes system resources (for example, CPU utilization and memory), depriving legitimate users. A stream attack sends TCP packets to a series of ports with random sequence numbers and random source IP addresses, resulting in high CPU usage. In a piggybacking attack, an intruder can gain unauthorized access to a system by using a valid user’s connection.
178. Denial-of-service attacks compromise which one of the following properties of information systems?
a. Integrity
b. Availability
c. Confidentiality
d. Reliability
A DoS attack does not affect integrity because the latter is a property that an object is changed only in a specified and authorized manner. A DoS attack does not affect confidentiality because the latter is a property ensuring that data is disclosed only to authorized subjects or users. A DoS attack does not affect reliability because the latter is a property defined as the probability that a given system is performing its mission adequately for a specified period of time under the expected operating conditions.
179. Which of the following is the
a. Preparation
b. Detection
c. Recovery
d. Remediation
More tools and technologies are relevant to the recovery phase than to any other phase; more technologies mean more complexity. The technologies involved and the speed of malware spreading make it more difficult to recover.
The other three phases such as preparation, detection, and remediation are less complex. The scope of preparation and prevention phase covers establishing plans, policies, and procedures. The scope of detection phase covers identifying classes of incidents and defining appropriate actions to take. The scope of remediation phase covers tracking and documenting security incidents on an ongoing basis to help in forensics analysis and in establishing trends.
180. Which of the following determines the system availability rate for a computer-based application system?
a. (Available time / scheduled time) x 100
b. [(1 + available time) / (scheduled time)] x 100
c. [(Available time)/(1 – scheduled time)] x 100
d. [(Available time – scheduled time) / (scheduled time)] x 100
181. A computer security incident was detected. Which of the following is the
a. Protect and preserve
b. Protect and recover
c. Trap and prosecute
d. Pursue and proceed