- Customer records were hidden, but might have been slightly garbled
- Every customer record is exposed by nation states
- The entire company database was posted to the Internet.
- Every customer record is stolen by hackers
- Motivated by greed, well funded and being tracked in increasingly efficient ways
- Motivated by curiosity and predictable
- Motivated by anger and unpredictable and well organized
- Motivated by dominance and being supported by world class means
- Cryptography
- Cryptanalysis
- Encryption
- Decryption
- Cryptography
- Cryptanalysis
- Encryption
- Decryption
- Integrity threats
- Adversary types
- A vailability threats
- Confidentiality threats
- Motivated by curiosity and predictable
- Motivated by greed, well funded and being tracked in increasingly efficient ways
- Motivated by anger and unpredictable and well organized
- Motivated by dominance and being supported by world class means
- The command interpreter that looks after the communication between the user and the system
- The OS that manages the control of the machine and supervises the scheduling of the programs
- None of these answers
- The utility tasks
- An improved version of the login program with enhanced secret access
- A trojan horse
- A login program that requires encryption support
- A compliant version of the code with respect to some process frameworks
- Carnegie Mellon Prize
- Japan Prize
- Bletchley Award
- Turing award
- Lots of attack choices, Hoping the size of encryption is not too big
- Fewer attack choices, and most will not work
- Large attack domain size that can be enumerated and traversed with automation
- Small number of attacks, where each is complex
- Code review
- None of these answers
- Process compliance
- Testing the software
- Pen testing is useful and covers all the possibilities
- Pen testing is useful but not enough
- Pen testing could be useful but is generally not used properly
- Pen testing is totally useless whatever the situation
- Human actions and organizational irresponsibility
- Missing security components
- All theses answers
- Bugs and system flaws
- End-to-end encryption
- None of these answers
- Secrecy technique
- Link encryption
- The command interpreter that looks after the communication between the user and the system
- The OS that manages the control of the machine and supervises the scheduling of the programs
- None of these answers
- The utility tasks
- Linking communicators together
- Increasing the quality of telecommunications
- Eliminating secrecy
- Using encryption mechanisms
- Security system parameters
- Security enabler
- Subject/Object model
- Object/subject program
- A malicious program that was set up to clog all the important networks used by the US administration
- A malicious program unleashed with no armful intention that lead to the infection of more than 10% of the world's computers.
- An error in programming that spred out to the internet by mistake.
- A ransom malware that stole millions of dollars from utilities whithin a few hours.
- Buffer overflow
- None of these answers
- Encryption
- Communication integrity
- Time
- Size
- Intelligence
- Complexity
- Buffer overflow
- A virus
- A denial of service attack
- A malware
- Auto-propagation without human intervention
- Multi-stage provisioning based on simple tools
- Local installation with expert system administration
- More complex design than a Trojan horse program
- Both will always prevent attacks
- Both are really a waste of time for mosts tools
- Neither can possibly prevent an attack.
- Both are more effective in the presence of external threat intelligence
- At Bell Labs
- At MIT
- In their garage
- At Berkeley
- Size
- Complexity
- Firewalls
- None of these answers
Q.26 Who is famous for insisting on the fact that proving the existence of one problem does not demonstrate the absence of others:
- Ken Thompson
- James Anderson
- E. Dijkstra
- Alan Turing
- Motivated by greed, well funded and being tracked in increasingly efficient ways
- Motivated by dominance, and being supported by world class means
- Motivated by anger and unpredictable and well organized
- Motivated by curiosity and predictable
- Compile, insert and add
- Confidentiality integrity and availability
- Components, installation and attribution
- Control, invest and adapt
- Money
- All theses answers
- Politics
- Curiosity
- Availability threat
- Confidentiality threat
- Integrity threat
- Fraud threat
- Motivated by curiosity and predictable
- Motivated by greed, well funded and being tracked in increasingly efficient ways
- Motivated by anger and unpredictable and well organized
- Motivated by dominance and being supported by world class means2
- The press is responsible for putting people who do this in a bad light
- It is not that serious since kids can do it
- It should not be considered a game and must be legally punished
- We should trust programmers not to do it
- Make it legal and impose contracts
- Multiple vendors
- None of these answers
- Program testing2
- Need for buget
- Lack of trust
- Problems in memory
- Malicious computing assets
Q.35 The difference between a hurricane knocking out a data center and a malicious hacker knocking out the same data center is following:
- There is no appreciable difference. Both result in a lost center.
- One is an attack the other is not.
- One involves multiple vulnerabilities and other is a weakness.
- Both involve a single vulnerability
Q.36 Which of the following is an advantage of more reactive cyber defense (versus proactive defense)?:
- More vendor options
- Less false positives
- Less false negatives
- Fewer vendor options
- Ken Thompson
- Bill Gates
- James Anderson
- Denis Ritchier