I have complete test bank for this class quiz message me for testbank Name_________________________ Date____________________ · There are 30 questions in this Quiz and each question is worth 2 points · The quiz is worth 10% of your final grade for the course. · For multiple choices, circle the option that best answers the question. For True/False, put either a T or F next to the question. For Fill in the blank choose your answer · Please provide your answers in the Answer Table below . · The quiz is due on Sunday November 1, 11:59 US EDT. Early submission is encouraged and is welcomed. There will be a 20% penalty for every day late (less than or equal 24 hours is considered a day) until no points are left. · The quiz is to be of your own work and no other individuals may assist you in this effort. · When applicable please provide your own examples to complement your material. · Please put your name & date at the top of the document and name your file using this file naming convention: fLastQuiz2.doc, e.g. the Quiz 1 file name for me would be aGhafarianQuiz1.doc · Please submit your work using the Quiz1 link in the Assignment area of LEO. · Use Cybercafé to post your questions about the Quiz but no questions about the questions themselves. TRUE/FALSE QUESTIONS 1. Malicious software aims to trick users into revealing sensitive personal data. 2. Keyware captures keystrokes on a compromised system. 3. The buffer overflow type of attack is one of the least commonly seen attacks 4. Several of the items in the CWE/SANS Top 25 Most Dangerous Software Errors list, Risky Resource Management category, are buffer overflow variants. 5. Security flaws occur as a consequence of sufficient checking and validation of data and error codes in programs. 6. A difference between defensive programming and normal practices is that everything is assumed. 7. It is possible for a system to be compromised during the installation process. 8. Ideally new systems should be constructed on an unprotected network in order to prevent installation restrictions. MULTIPLE CHOICES QUESTIONS 9. A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim’s data is __________. a. Adobe b. Animoto c. malware d. Prezi 10. A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met. a. logic bomb b. trapdoor c. worm d. Trojan horse 11. A _______ can occur as a result of a programming error when a process attempts to      store data beyond the limits of a fixed-size buffer. a. shellcode b. program overflow c. buffer overflow d. library function 12. A ______ is a structure where data are usually saved on the stack. a. guard page b. stack frame c. heap d. NOP sled 13. _________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program. a. PHP attack b. Format string injection attack c. XSS attack . d. Injection attack 14. A _______ attack is where the input includes code that is then executed by the attacked system. a. SQL injection b. cross-site scripting c. code injection d. interpreter injection 15. The first step in deploying new systems is _________. a. security testing b. installing patches c. planning d. secure critical content 16. Which of the following need to be taken into consideration during the system  security planning process? a. how users are authenticated b. the categories of users of the system c. what access the system has to information stored on other hosts d. all of the above FILL IN THE BLANK 17. A _________ is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence of its presence. 18. A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack. 19. The function of the ____…

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay