0% found this document useful (0 votes)
746 views9 pages

Itt320 Quiz (Question)

Uploaded by

tesq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
746 views9 pages

Itt320 Quiz (Question)

Uploaded by

tesq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

CONFIDENTIAL CS/MEI 2021/ITT320

UNIVERSITI TEKNOLOGI MARA


ONLINE QUIZ

COURSE : INTRODUCTION TO COMPUTER SECURITY


COURSE CODE : ITT320
DATE : MEI 2021
TIME : 2 HOURS

NAME: MUHAMMAD DANISH HAKIM BIN ABDUL HAKIMI

MATRIC NO: 2019245438

LECTURER: Sir Hafizan

PART A (15 MARKS)

1. A person who uses scripts and programs written by others to perform his intrusion is
labelled as _________.

A. cracker

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 2 CS/MEI 2021/ITT320

B. hacker
C. phreak
D. script kiddie

2. Which of the following does not reflex what a WHITE HAT hacker is?

A. A person who enjoys exploring the details of programmable systems and how to
stretch their capabilities.
B. A person who programs enthusiastically and is good at programming quickly.
C. A person who enjoys the intellectual challenge of creatively overcoming or
circumventing limitations.
D. A person who enjoys discovering vulnerabilities and directly posts them for full
disclosures.

3. The term __________refers to a person who has a keen interest in telephones and
telephones systems.

A. Script kiddies
B. Hacker
C. Cracker
D. Phreaks

4. Which of the following is the most basic security activity?

A. Authentication
B. Firewalls
C. Password protection
D. Auditing

5. Rose just installed a new search engine on her laptop. Now whenever she searches the
Internet, she gets several pop‐up windows directing her to websites to buy products.
What does Rose have?

A. Phishing
B. Spyware
C. Adware
D. Trojan horse

• The victim will wait for connection to be establish.

• While the victim server is waiting, attacker will send another spoofed
syn packet continuously.

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 3 CS/MEI 2021/ITT320

6. This statement above is referring to _________.

A. UDP flood
B. ICMP flood
C. SYN flood
D. Smurf Attack

7. The ____________ flag contains a carefully constructed cookie, generated a hash that
contains the IP address, port number, and other information from the client machine
requesting the connection. (three-way handshake process).

A. ACK
B. SYN-ACK
C. SYN
D. ACK-SYN

8. The only real safeguard against Ping of Death is to ensure that all ___________ and
_________ are routinely patched. This attack relies on vulnerabilities in the way a
particular operating systems or application handles abnormally large TCP packets.

A. Operating systems, hardware


B. Hardware, anti-virus
C. Operating systems, software
D. Operating systems, anti-virus

9. What is the name for the Denial of Service (DoS) attack that Utilizes the ICMP, which in
the early stage it will sent the package to everyone in the network, and when they want
to reply back they will eventually be sent it to a fake destination (the victim IP address)?

A. SYN flood
B. Smurf attack
C. Ping of death
D. Distributed Denial of Service

10. ___________ seek to avoid SYN floods by changing the way the server allocates
memory for any given connection request. Instead of allocating a complete connection
object, the server is altered so that it only allocates a small-record.

A. SYN Cookies
B. Micro Blocks
C. SYN Blocks
D. RST Blocks

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 4 CS/MEI 2021/ITT320

11. What are the rules that can be used in setting-up the “screening” firewalls?

A. protocol type, source port, destination port, source IP address, destination IP


address
B. source IP address, destination IP address, protocol version, source port, destination
port
C. Inbound rules
D. Outbound rules

12. Why is a Stateful Inspection (SPI) firewall more resistant to flooding attacks?
A. It automatically blocks large traffic from a single IP
B. It requires user authentication
C. It examines each packet in the context of previous packets
D. It examines each packet in the context of next packets

13. State what are the similarities of the characteristics between Application Gateway
firewall and Circuit Level Gateway firewall?
A. Both implement virtual circuit as the proxy
B. Both requires user authentication
C. Both firewalls are a cheap solution to setup
D. Both firewalls enable administrators to specify what applications to be allowed to
run in the network

• Instead of configure the firewall in the operating system itself, this


firewall gives another layer of simple protection at the first line of
defense.

• Mostly, it uses only a simple packet filtering approach and it is very easy

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 5 CS/MEI 2021/ITT320

to configure.

• Suitable for novice administrators

14. The statement above best to describe about _________ firewall:

A. Network host-based
B. Router-based
C. Single home
D. Dual home

15. A Device that can hide the the internal IP addresses is known as _________ .

A. Screened host
B. Bastion firewall
C. Proxy server
D. Proxy router

ANSWER (PART A):

1 A 6 C 11 A
2 A 7 C 12 C
3 D 8 D 13 B
4 A 9 B 14 B
5 C 10 B 15 B

5. PART B (15 MARKS)

QUESTION 1

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 6 CS/MEI 2021/ITT320

a) In configuring a network, they are a few parameters to be identified. Briefly explain


hybrid approach and state the most desirable hybrid approach?

(2 marks)

Answer:

Hybrid approach is combination of multiple security paradigms like combining perimeter


security approach and layered security approach.

b) There are two perspectives in relation to security, they are:

I. First Perspective : There is no real threat


II.Second Perspective : All hackers are experts and out to break into my network

State what is the Difference between the first perspective and second perspective.

(3 marks)
Answer:

For the first perspective different with second:

-Fosters a laissez-faire attitude toward security but second perspective take this as a
crucial situation

-security measures are not put in place until after a breach has occurred but second
perspective already prepared security

-this approach must be avoided at all costs and second perspective is the only one
that we need to approach.

QUESTION 2

Denial of service attack is a most common type of attack, because it is easy to execute.
Even a surveillance with minimal skill also able to perform it. As a network administrator

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 7 CS/MEI 2021/ITT320

it is our task to ensure our network is in the utmost security.

a) State TWO (2) ways that we can do to protect against Smurf Attack.
(3 marks)
Answer:

-configure firewall to disallow incoming the protocols


-maintain virus protection on all clients on network
-use proxy server

b) Discuss why Stateful Packet Inspection (SPI) firewall is one of the easiest ways to
stop a SYN flood attack.

(2 marks)

Answer:

Because it aware of context of packets and makes them less susceptible to flood
attacks since it knows if packet is part of a larger stream and SPI can recognizes
whether source IP is within the firewall

QUESTION 3

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 8 CS/MEI 2021/ITT320

a) Circuit gateway firewall be told that to be more secure compare to application


gateway firewall. Describe in detail what is the advantages of the. Circuit gateway
firewall.

(3 marks)
Answer:

-typicallly implemented on high-end equipment


-virtual circuit is used to pass bytes between client and proxy server
-external users only see the proxy IP not the internal client IP address

b) As the technology advance, the new specification of firewall emerges to support with
the latest needs in the network field. Briefly discuss what is a Hybrid firewall and how
it is operating.
(2 marks)

Answer:

Hybrid firewalls are the combined of others firewall such as stateful packet inspection
(SPI) combined with circuit level gateways. They work together by combining their
abilities to become a more powerful firewall.

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 9 CS/MEI 2021/ITT320

END OF QUESTION PAPER

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy