1Which of the following is NOT one of the four necessary conditions for a deadlock to occur in an operating system?
Deadlock Characterization
Easy
A.Preemption
B.Circular Wait
C.Hold and Wait
D.Mutual Exclusion
Correct Answer: Preemption
Explanation:
The four necessary conditions for deadlock are Mutual Exclusion, Hold and Wait, No Preemption, and Circular Wait. Preemption, the act of taking a resource away from a process, is a method to prevent deadlocks, not a condition that causes them.
Incorrect! Try again.
2The condition where a process holds at least one resource and is waiting to acquire additional resources held by other processes is known as:
Deadlock Characterization
Easy
A.Hold and Wait
B.No Preemption
C.Circular Wait
D.Mutual Exclusion
Correct Answer: Hold and Wait
Explanation:
The 'Hold and Wait' condition describes a situation where a process is currently holding one or more resources while simultaneously waiting for another resource that is currently held by a different process.
Incorrect! Try again.
3Deadlock prevention involves ensuring that at least one of the four necessary deadlock conditions cannot hold. Which strategy prevents the 'Circular Wait' condition?
Handling of deadlocks- Deadlock Prevention
Easy
A.Imposing a total ordering of all resource types and requiring that each process requests resources in an increasing order.
B.Ensuring that at least one resource is shareable.
C.Allowing the system to take resources away from processes.
D.Requiring each process to request all its resources at once.
Correct Answer: Imposing a total ordering of all resource types and requiring that each process requests resources in an increasing order.
Explanation:
By enforcing a strict order in which resources must be requested (e.g., always request resource R1 before R2), a circular chain of requests becomes impossible, thus preventing the 'Circular Wait' condition.
Incorrect! Try again.
4The Banker's Algorithm is a well-known method for:
Handling of deadlocks- Deadlock Avoidance & Detection
Easy
A.Deadlock avoidance
B.Deadlock detection
C.Deadlock recovery
D.Deadlock prevention
Correct Answer: Deadlock avoidance
Explanation:
The Banker's Algorithm is a classic deadlock avoidance algorithm. It checks if granting a resource request to a process will lead the system into an 'unsafe' state, where a deadlock might occur. If the resulting state is safe, the request is granted; otherwise, it is denied.
Incorrect! Try again.
5Which of the following is a common method for recovering from a deadlock?
Handling of deadlocks- Deadlock Recovery
Easy
A.Restarting the entire operating system.
B.Granting all pending resource requests.
C.Terminating one or more of the deadlocked processes.
D.Adding more physical memory to the system.
Correct Answer: Terminating one or more of the deadlocked processes.
Explanation:
A direct way to break a deadlock is to abort one or more of the processes involved. This frees up the resources held by the terminated process, allowing other processes in the deadlock cycle to proceed.
Incorrect! Try again.
6In the context of process scheduling, what is 'starvation'?
Starvation
Easy
A.When a process is indefinitely denied access to a resource it needs.
B.When two processes are waiting for each other in a circular fashion.
C.When a process completes its execution successfully.
D.When the system runs out of CPU time for all processes.
Correct Answer: When a process is indefinitely denied access to a resource it needs.
Explanation:
Starvation, or indefinite blocking, occurs when a process is ready to run but is continuously passed over by the scheduler, perhaps due to a low priority. As a result, it never gets the resources (like the CPU) it requires to make progress.
Incorrect! Try again.
7The three fundamental goals of security, often called the 'CIA Triad', are Confidentiality, Integrity, and what?
Goals of protection
Easy
A.Authentication
B.Accountability
C.Availability
D.Authorization
Correct Answer: Availability
Explanation:
The CIA Triad consists of Confidentiality (preventing unauthorized disclosure of information), Integrity (preventing unauthorized modification of information), and Availability (ensuring information and resources are accessible to authorized users when needed).
Incorrect! Try again.
8What is the 'Principle of Least Privilege'?
Principles of protection
Easy
A.The principle that the operating system should use the least amount of memory possible.
B.The principle that the least important tasks should be run first.
C.Giving a program only the minimum access rights it needs to perform its job.
D.Giving every user administrator rights.
Correct Answer: Giving a program only the minimum access rights it needs to perform its job.
Explanation:
The Principle of Least Privilege is a security best practice that dictates that a user, process, or program should only have the bare minimum permissions required to perform its function. This minimizes the potential damage from a security breach.
Incorrect! Try again.
9A secret, undocumented entry point into a program used to bypass normal security mechanisms is known as a:
A backdoor (or trapdoor) is a hidden method of bypassing security controls, authentication, or encryption in a computer system, product, or embedded device. It is often created for legitimate purposes but can be exploited if discovered by attackers.
Incorrect! Try again.
10What is the primary purpose of authentication in a computer system?
Authentication-Password based Authentication
Easy
A.To determine what actions a user is allowed to perform.
B.To encrypt data during transmission.
C.To verify the identity of a user or process.
D.To keep a log of user activities.
Correct Answer: To verify the identity of a user or process.
Explanation:
Authentication is the process of confirming that a user, device, or entity is who or what it claims to be. It is the first step in providing secure access to a system.
Incorrect! Try again.
11Which type of malicious software is defined by its ability to self-replicate by attaching itself to another program?
Application Security - Virus, Program Threats
Easy
A.Trojan Horse
B.Spyware
C.Virus
D.Worm
Correct Answer: Virus
Explanation:
The defining characteristic of a computer virus is its ability to replicate itself and spread from one computer to another by attaching itself to a host program or file.
Incorrect! Try again.
12In an operating system's protection model, what is a 'domain'?
Domain of protection
Easy
A.A collection of access rights, specifying which objects a subject can access and how.
B.A specific user account.
C.A type of network architecture.
D.The physical location of the computer.
Correct Answer: A collection of access rights, specifying which objects a subject can access and how.
Explanation:
A protection domain is an abstract concept that defines a set of objects and the types of operations that may be invoked on each object. A process executes in a specific domain and can only access resources within that domain.
Incorrect! Try again.
13In the context of OS protection, what does an 'Access Matrix' represent?
Access matrix
Easy
A.The speed at which data can be accessed from a disk.
B.The physical layout of memory chips.
C.The set of permissions that subjects (like users or processes) have for objects (like files or devices).
D.A list of all users currently logged into the system.
Correct Answer: The set of permissions that subjects (like users or processes) have for objects (like files or devices).
Explanation:
An access matrix is a model where the rows represent subjects (e.g., processes) and the columns represent objects (e.g., files). The entry at [row i, column j] specifies the access rights that subject i has on object j.
Incorrect! Try again.
14A network attack designed to make an online service unavailable by overwhelming it with traffic from a single source is called a:
System and network threats
Easy
A.Man-in-the-Middle Attack
B.SQL Injection Attack
C.Phishing Attack
D.Denial-of-Service (DoS) Attack
Correct Answer: Denial-of-Service (DoS) Attack
Explanation:
A Denial-of-Service (DoS) attack aims to disrupt the normal functioning of a server, service, or network by flooding it with an overwhelming amount of traffic, rendering it inaccessible to legitimate users.
Incorrect! Try again.
15Which of the following is a poor practice for password security?
Password Maintenance & Secure Communication
Easy
A.Using the same password for multiple websites.
B.Changing your password regularly.
C.Using a password manager to store unique passwords.
D.Using a mix of uppercase letters, lowercase letters, numbers, and symbols.
Correct Answer: Using the same password for multiple websites.
Explanation:
Reusing the same password across multiple services is a significant security risk. If one service is breached and the password is stolen, attackers can use it to gain access to all other accounts where that password was used.
A.When the network buffer becomes full and drops packets.
B.When a user provides too much input to a program.
C.When the hard disk's read/write buffer is corrupted.
D.When a program writes data beyond the allocated memory for a buffer.
Correct Answer: When a program writes data beyond the allocated memory for a buffer.
Explanation:
A buffer overflow occurs when the volume of data exceeds the storage capacity of the memory buffer. This can cause data to overwrite adjacent memory locations, which can be exploited by attackers to run malicious code.
Incorrect! Try again.
17What is the primary goal of implementing security measures in a multi-user operating system?
Need for Security
Easy
A.To reduce the overall cost of the computer hardware.
B.To make the system run faster.
C.To ensure all users have the same level of access.
D.To prevent unauthorized access and protect user data from corruption or theft.
Correct Answer: To prevent unauthorized access and protect user data from corruption or theft.
Explanation:
The core purpose of OS security is to control who can access the system and its resources, ensuring the confidentiality and integrity of user and system data against unauthorized actions.
Incorrect! Try again.
18An attack that uses deceptive emails and websites to trick users into providing personal information, such as passwords or credit card numbers, is known as:
Examples of attacks
Easy
A.Buffer Overflow
B.Denial of Service
C.Phishing
D.A Worm
Correct Answer: Phishing
Explanation:
Phishing is a type of social engineering attack where attackers impersonate a trustworthy entity in an electronic communication to lure victims into revealing sensitive data.
Incorrect! Try again.
19A common way to implement an Access Matrix is by storing each column as a list. What is this implementation called?
Implementation of access matrix
Easy
A.Access Control List (ACL)
B.Lock-Key Mechanism
C.Capability List
D.A Global Table
Correct Answer: Access Control List (ACL)
Explanation:
An Access Control List (ACL) corresponds to a column in the Access Matrix. For each object (like a file), the ACL specifies all the subjects (users) that have access to it and what their specific permissions are.
Incorrect! Try again.
20A malicious program that appears to be a legitimate and useful application but performs harmful actions once executed is called a:
Application Security - Virus, Program Threats
Easy
A.Virus
B.Trojan Horse
C.Rootkit
D.Worm
Correct Answer: Trojan Horse
Explanation:
A Trojan Horse is a type of malware that disguises itself as a legitimate program. Unlike a virus or worm, it does not self-replicate, but it can create a backdoor for an attacker or steal sensitive information.
Incorrect! Try again.
21Consider a system with 3 processes (P0, P1, P2) and 3 resource types (A, B, C) with 10, 5, and 7 instances respectively. The current state is as follows:
What is the content of the Available vector and is the system in a safe state?
Handling of deadlocks- Deadlock Avoidance & Detection
Medium
A.Available = (5, 4, 5), Safe
B.Available = (3, 3, 2), Not Safe
C.Available = (5, 4, 5), Not Safe
D.Available = (3, 3, 2), Safe
Correct Answer: Available = (5, 5, 3), Safe
Explanation:
First, calculate the total allocated resources by summing the Allocation columns: (2+4+1, 1+0+1, 3+2+2) = (7, 2, 7). Next, calculate the Available vector by subtracting the total allocated resources from the total instances: (12-7, 7-2, 10-7) = (5, 5, 3). Now, use the Banker's algorithm to check for a safe state. We need the Need matrix (Max - Allocation):
P0 Need: (6, 3, 2)
P1 Need: (2, 2, 0)
P2 Need: (2, 2, 1)
With Available = (5, 5, 3), we can satisfy the need of P1 or P2. Let's choose P1. P1 runs and releases its resources. New Available = (5, 5, 3) + (4, 0, 2) = (9, 5, 5). Now, with the new Available vector, we can satisfy P2's need. P2 runs and releases its resources. New Available = (9, 5, 5) + (1, 1, 2) = (10, 6, 7). Finally, we can satisfy P0's need. Since a safe sequence like <P1, P2, P0> exists, the system is in a safe state.
Incorrect! Try again.
22A system has several processes and a single instance of a resource R1. If a process is allowed to request another resource R2 while holding R1, but is forced to release R1 if its request for R2 is denied, which of the four necessary conditions for deadlock is being prevented?
Deadlock Characterization
Medium
A.Circular Wait
B.No Preemption
C.Hold and Wait
D.Mutual Exclusion
Correct Answer: Hold and Wait
Explanation:
The 'Hold and Wait' condition states that a process must be holding at least one resource and waiting to acquire additional resources that are currently being held by other processes. By forcing a process to release its held resources (R1) when its new request (for R2) cannot be immediately granted, the system ensures that a process cannot hold a resource while waiting for another. This directly breaks the 'Hold and Wait' condition.
Incorrect! Try again.
23An attacker exploits a vulnerability in a web server by sending a carefully crafted input string that is larger than the buffer allocated on the stack for it. The primary goal of overwriting data beyond the buffer's boundary in this specific scenario is typically to:
Security Vulnerability like Buffer overflow, Trapdoors, Backdoors, cache poisoning etc
Medium
A.Corrupt adjacent variables to alter program logic in a minor way.
B.Fill up the server's memory to slow it down.
C.Overwrite the function's return address to execute malicious code.
D.Crash the server to cause a denial of service.
Correct Answer: Overwrite the function's return address to execute malicious code.
Explanation:
While a buffer overflow can cause a crash (Denial of Service), the more sophisticated goal is to gain control of the program's execution flow. By overflowing a buffer on the stack, an attacker can overwrite the saved return address. When the function attempts to return, it will instead jump to a memory location specified by the attacker, which typically contains malicious shellcode, allowing for arbitrary code execution.
Incorrect! Try again.
24In a system that implements its access matrix using Access Control Lists (ACLs), which of the following operations is the most computationally efficient?
Implementation of access matrix
Medium
A.Verifying if a specific user can write to a specific file.
B.Finding all files a specific user can read.
C.Listing all users who have no access to any file.
D.Transferring all access rights for a file from one user to another.
Correct Answer: Verifying if a specific user can write to a specific file.
Explanation:
Access Control Lists (ACLs) are stored with the objects (e.g., files). An ACL for a file is a list of users/groups and their corresponding permissions for that file. To verify if user U can write to file F, the system only needs to look up the ACL for file F and check for an entry for user U with write permission. This is a direct and efficient lookup. In contrast, finding all files a user can access would require iterating through the ACL of every file in the system, which is very inefficient.
Incorrect! Try again.
25A system administrator configures a web server to run with full root/administrator privileges. The web server only needs to read files from /var/www and bind to port 80. Which fundamental security principle is most clearly violated by this configuration?
Principles of protection
Medium
A.Principle of Separation of Privilege
B.Principle of Least Privilege
C.Principle of Open Design
D.Principle of Complete Mediation
Correct Answer: Principle of Least Privilege
Explanation:
The Principle of Least Privilege dictates that a process or user should be given only those privileges that are essential to perform its intended function. Running a web server as root gives it far more power than it needs (e.g., the ability to modify any system file, install software, or shut down the machine). If the web server is compromised, the attacker gains full control of the system. The correct approach would be to grant the server only the specific permissions it requires.
Incorrect! Try again.
26A common strategy to prevent circular wait is to enforce a total ordering of all resource types, requiring that each process requests resources in an increasing order of enumeration. What is a major drawback of this approach?
Handling of deadlocks- Deadlock Prevention
Medium
A.It requires preemption of resources, which is complex to implement.
B.It may be impossible for a process to obtain resources in the enforced order, thus delaying its execution unnecessarily.
C.It can lead to starvation of processes that need a low-numbered resource first.
D.It violates the mutual exclusion condition.
Correct Answer: It may be possible for a process to obtain resources in the enforced order, thus delaying its execution unnecessarily.
Explanation:
While enforcing a resource ordering effectively prevents circular wait, it can lead to poor resource utilization and process delays. A process might need a resource with a high number (e.g., R5) and a resource with a low number (e.g., R1). Even if R5 is available, the process must first request and acquire R1, even if it doesn't need R1 until much later. This artificial ordering can force processes to acquire and hold resources long before they are actually needed, reducing overall system efficiency.
Incorrect! Try again.
27In a preemptive priority-based scheduling system, a continuous stream of high-priority processes can prevent a low-priority process from ever getting CPU time. This situation is a classic example of:
Starvation
Medium
A.Deadlock
B.Starvation
C.Aging
D.A race condition
Correct Answer: Starvation
Explanation:
Starvation, or indefinite blocking, occurs when a process is perpetually denied necessary resources to complete its work. In this scenario, the CPU is the resource, and the low-priority process is starved because higher-priority processes are always chosen by the scheduler. This is different from deadlock, where processes are in a circular wait for resources held by each other. Here, the low-priority process is simply never selected to run.
Incorrect! Try again.
28What is the primary security purpose of using a 'salt' when hashing user passwords for storage?
Authentication-Password based Authentication
Medium
A.To make the hashing algorithm slower and more resource-intensive.
B.To ensure that every user's hashed password is the same length.
C.To encrypt the password before it is hashed.
D.To prevent attackers from using pre-computed tables of hashes (rainbow tables).
Correct Answer: To prevent attackers from using pre-computed tables of hashes (rainbow tables).
Explanation:
A salt is a unique, random value added to each user's password before it is hashed. This means that two users with the same password will have different hashes stored in the database. An attacker who steals the password database cannot use a rainbow table (a pre-computed list of hashes for common passwords) to crack all passwords at once, because they would need a separate rainbow table for every unique salt. This makes brute-force attacks against the entire database significantly more difficult.
Incorrect! Try again.
29An attacker positions themselves on a public Wi-Fi network between a user and a legitimate website. They intercept, read, and possibly alter the communication between the two parties, who are unaware of the attacker's presence. What is this type of attack called?
System and network threats
Medium
A.SQL Injection
B.Denial of Service (DoS)
C.Man-in-the-Middle (MITM)
D.Phishing
Correct Answer: Man-in-the-Middle (MITM)
Explanation:
A Man-in-the-Middle (MITM) attack occurs when an attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. The attacker intercepts all messages passing between the two victims and injects new ones, making it appear as if a normal conversation is taking place. Public Wi-Fi is a common environment for such attacks.
Incorrect! Try again.
30When an operating system detects a deadlock and decides to recover by terminating processes, which factor is often the LEAST important when choosing a 'victim' process to terminate?
Handling of deadlocks- Deadlock Recovery
Medium
A.The process's priority.
B.The name of the user who owns the process.
C.How many and what type of resources the process holds.
D.How long the process has already been running.
Correct Answer: The name of the user who owns the process.
Explanation:
When selecting a victim process to break a deadlock, the OS considers several factors to minimize the impact of the termination. These include the process's priority (low-priority processes are better victims), how much work it has already done (a process close to completion is a poor choice), and which resources it holds (terminating a process that holds resources needed by many other processes can break the deadlock effectively). The username of the owner is generally irrelevant from a technical, algorithmic standpoint, although system policy might sometimes factor it in.
Incorrect! Try again.
31What is the key difference between a computer virus and a worm?
Application Security - Virus, Program Threats
Medium
A.A virus is written in a low-level language, while a worm is written in a scripting language.
B.A virus is malicious, whereas a worm is not.
C.A worm targets networks, whereas a virus only targets individual computers.
D.A virus requires a host program to replicate, while a worm is a standalone program that can replicate on its own.
Correct Answer: A virus requires a host program to replicate, while a worm is a standalone program that can replicate on its own.
Explanation:
The fundamental distinction lies in their method of propagation. A virus attaches itself to an executable file or document (the host) and spreads when that host is transferred to and executed on another computer. A worm is a self-contained program that can propagate across networks from one computer to another without requiring any user interaction or a host file.
Incorrect! Try again.
32A disgruntled employee uses their authorized access to a company's database to subtly change financial records, altering transaction amounts. Which primary goal of security has been violated?
Goals of protection
Medium
A.Integrity
B.Confidentiality
C.Authentication
D.Availability
Correct Answer: Integrity
Explanation:
Integrity refers to the trustworthiness and accuracy of data. It ensures that data has not been modified in an unauthorized manner. By altering financial records, the employee has directly compromised the integrity of the data. Confidentiality (preventing unauthorized disclosure) and Availability (ensuring data is accessible) were not the primary goals violated in this specific action.
Incorrect! Try again.
33In a Resource Allocation Graph (RAG), a cycle is detected. The system has multiple instances of each resource type. What can be concluded about the state of the system?
Deadlock Characterization
Medium
A.The system will enter a deadlock state soon.
B.The system may or may not be in a deadlocked state.
C.The system is not in a deadlocked state.
D.The system is definitely in a deadlocked state.
Correct Answer: The system may or may not be in a deadlocked state.
Explanation:
A cycle in a Resource Allocation Graph is a necessary but not sufficient condition for deadlock when there are multiple instances of resource types. A cycle indicates that there is a circular wait, but deadlock only occurs if the processes in the cycle are waiting for resources for which there are no available instances that can be allocated. It's possible for a process outside the cycle to release its instance of a needed resource, allowing a process in the cycle to proceed and break the cycle.
Incorrect! Try again.
34Consider the following Access Matrix for a system with three processes (P1, P2, P3) and three files (F1, F2, F3).
If P1 attempts to grant 'read' access for F1 to P2, under which policy would this be allowed?
Access matrix
Medium
A.If P1 has the 'copy' right for the F1 entry in its domain.
B.If P1 has the 'transfer' right for the F1 entry in its domain.
C.If P1 is the owner of F1.
D.This action is never allowed as P1 cannot modify the access matrix directly.
Correct Answer: If P1 has the 'copy' right for the F1 entry in its domain.
Explanation:
The standard access matrix model can be extended with special rights like owner, copy, and transfer that allow domains to modify the matrix itself. The copy right allows a process to grant a right it possesses to another process. The transfer right is similar but revokes the right from the original process. The owner right typically includes both. In this context, if P1's entry for F1 was read, copy, it could then add the read right to P2's entry for F1.
Incorrect! Try again.
35A programmer leaves a hidden mechanism in the system's login routine that allows them to bypass standard authentication by providing a special, hardcoded password. This mechanism was intentionally created for later unauthorized access. What is this vulnerability called?
Security Vulnerability like Buffer overflow, Trapdoors, Backdoors, cache poisoning etc
Medium
A.Logic Bomb
B.Buffer Overflow
C.Trapdoor
D.Backdoor
Correct Answer: Backdoor
Explanation:
A backdoor is a covert method of bypassing normal authentication or security controls. It is intentionally designed and implemented by someone familiar with the system (like the original programmer) to allow for secret, unauthorized access in the future. A trapdoor is a similar concept but is often used to refer to a secret entry point left for legitimate debugging purposes that was not removed, whereas a backdoor is explicitly malicious.
Incorrect! Try again.
36How does a user process typically transition from the user domain (e.g., Ring 3) to the kernel domain (e.g., Ring 0) to request a privileged operation like file I/O?
Domain of protection
Medium
A.By sending an inter-process communication (IPC) message to the kernel.
B.By modifying a special register in the CPU.
C.By directly calling a kernel function.
D.By executing a system call instruction (e.g., TRAP or SYSCALL).
Correct Answer: By executing a system call instruction (e.g., TRAP or SYSCALL).
Explanation:
Direct calls from user mode to kernel mode are prohibited by the hardware protection mechanism. To request a kernel service, a user process must execute a special instruction (often called a TRAP, SYSCALL, or INT). This instruction causes a hardware interrupt that switches the CPU from user mode to kernel mode and transfers control to a specific, predefined entry point in the operating system's kernel. The kernel then validates the request and performs the privileged operation on behalf of the user process.
Incorrect! Try again.
37What is the primary objective of a DNS cache poisoning attack?
Examples of attacks
Medium
A.To overload DNS servers, making them unavailable.
B.To corrupt the mapping of a domain name to an IP address in a DNS server's cache.
C.To steal the domain name registration from its legitimate owner.
D.To intercept the traffic between a user and a DNS server.
Correct Answer: To corrupt the mapping of a domain name to an IP address in a DNS server's cache.
Explanation:
In a DNS cache poisoning attack, an attacker tricks a DNS server into caching an incorrect IP address for a legitimate domain name (e.g., www.mybank.com). When users query this DNS server, they are given the attacker's malicious IP address instead of the real one. This redirects users to a fraudulent website, where they might be tricked into revealing sensitive information like passwords or credit card numbers.
Incorrect! Try again.
38A piece of malicious code is embedded in a large, seemingly legitimate software package. The code is designed to remain dormant until a specific date and time (e.g., April 1st), at which point it activates and deletes critical system files. This type of program threat is best described as a:
Application Security - Virus, Program Threats
Medium
A.Worm
B.Logic Bomb
C.Rootkit
D.Trojan Horse
Correct Answer: Logic Bomb
Explanation:
A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. The condition in this case is a specific date and time. It is often delivered via a Trojan horse, which is the legitimate-seeming software that carries the malicious payload, but the payload's trigger-based nature is the defining characteristic of a logic bomb.
Incorrect! Try again.
39What is the main security advantage of using a challenge-response authentication protocol over sending a hashed password across an insecure network?
Secure Communication
Medium
A.It is faster because no hashing is required.
B.It prevents replay attacks where an attacker could capture and reuse the authentication credential.
C.It requires less computational power on the server-side.
D.It allows the user to have a simpler password.
Correct Answer: It prevents replay attacks where an attacker could capture and reuse the authentication credential.
Explanation:
In a challenge-response system, the server sends a random, one-time value (the challenge) to the client. The client uses its secret (like a password) to compute a response based on the challenge and sends it back. Since the challenge is different for each login attempt, an attacker who captures the response cannot reuse it for a future login (a replay attack). Even capturing a hashed password could be a vulnerability if the attacker can simply replay that same hash to the server to authenticate.
Incorrect! Try again.
40A system uses Capability Lists to manage access rights. Each process has a list of capabilities, where each capability specifies an object and the permitted operations. What is a significant security challenge associated with this implementation?
Implementation of access matrix
Medium
A.Revoking a user's access to a specific object is very difficult.
B.It is computationally expensive to check if a process can access an object.
C.Determining which processes can access a specific object is efficient.
D.Capabilities can be forged or modified by user-level processes if not properly protected.
Correct Answer: Capabilities can be forged or modified by user-level processes if not properly protected.
Explanation:
Since capabilities are held by user processes, a major challenge is preventing those processes from creating or modifying their own capabilities to gain unauthorized access. The operating system must ensure that capabilities are unforgeable. This is typically achieved by keeping the capabilities within the kernel's protected memory space and having processes refer to them via secure handles, or by using cryptographic techniques. The other options are generally not true; for instance, revocation is a known challenge but not necessarily the most significant, and checking access is very efficient.
Incorrect! Try again.
41Consider a system with 3 processes (P0, P1, P2) and 3 resource types (A, B, C) with 10, 5, and 7 instances respectively. The current state is given by the following Allocation and Max matrices:
If process P1 makes a request for Request1 = (1, 0, 2), what is the state of the system after granting this request?
Deadlock Avoidance & Detection
Hard
A.The system is in an unsafe state, as no sequence of process execution can be found.
B.The system is in a safe state, with a valid safe sequence such as <P1, P0, P2>.
C.The request is denied because it exceeds P1's maximum claim.
D.The system is in a safe state, but only if P0 runs first in the safe sequence.
Correct Answer: The system is in an unsafe state, as no sequence of process execution can be found.
Explanation:
First
Incorrect! Try again.
42In a large multi-user system, a security policy change requires revoking a single user's access rights to thousands of objects they previously had access to. Comparing an implementation of the Access Matrix using Access Control Lists (ACLs) versus Capability Lists (C-Lists), which statement is most accurate regarding the complexity of this specific revocation operation?
Implementation of access matrix
Hard
A.ACLs are less efficient because the system must iterate through thousands of object ACLs to remove the user's entry from each one.
B.Both implementations have similar, near-constant time complexity for this operation due to modern indexing techniques.
C.ACLs are more efficient because you only need to modify the user's entry, which is stored centrally.
D.C-Lists are more efficient because you can simply destroy the user's capability list.
Correct Answer: ACLs are less efficient because the system must iterate through thousands of object ACLs to remove the user's entry from each one.
Explanation:
This question analyzes the operational complexity of two common access matrix implementations.
Access Control Lists (ACLs) store permissions with the object. To revoke a user's access to many objects, the system must access the ACL of each of the thousands of objects and remove the entry for that user. This is a highly distributed and I/O intensive operation.
Capability Lists (C-Lists) store permissions with the subject (user/process). To revoke all of a user's rights, the operating system can manage and invalidate the user's central capability list, which is far more efficient. However, direct C-List revocation is complex. A common way is indirect revocation via pointers or proxies, but even then, the core issue with pure C-lists is that the capabilities are distributed. The most common solution to the revocation problem in C-list systems is to have the OS maintain control over the C-lists, so it can destroy the user's list. Compared to traversing thousands of ACLs, managing a central list for the user is more direct. The statement that ACLs require iterating through thousands of objects is the most accurate description of the high complexity involved for that method.
Incorrect! Try again.
43An attacker aims to exploit a buffer overflow vulnerability on a modern 64-bit Linux system. The system has protections including the Non-Executable (NX) bit and Address Space Layout Randomization (ASLR). The attacker's payload cannot be directly injected and executed from the stack. Which technique is specifically designed to bypass both of these protections simultaneously to achieve arbitrary code execution?
Security Vulnerability like Buffer overflow, Trapdoors, Backdoors, cache poisoning etc
Hard
A.A simple stack smashing attack that overwrites the return address to point to shellcode on the stack.
B.An integer overflow attack that corrupts a size variable, leading to a denial of service.
C.Return-Oriented Programming (ROP) where the stack is filled with addresses of existing code 'gadgets' within loaded libraries.
D.A heap spraying attack where multiple copies of shellcode are placed in the heap to increase the odds of a corrupted function pointer hitting them.
Correct Answer: Return-Oriented Programming (ROP) where the stack is filled with addresses of existing code 'gadgets' within loaded libraries.
Explanation:
This question requires understanding modern exploit mitigation and the techniques to bypass them.
The NX bit (or DEP) prevents code execution from the stack, defeating simple stack smashing attacks (Option A).
ASLR randomizes the memory locations of libraries and the stack, making it difficult to guess the address of required functions or shellcode (defeating naive ROP and heap spraying).
Return-Oriented Programming (ROP) is the advanced technique that chains together small sequences of existing code (called 'gadgets'), which are already in executable memory regions (bypassing NX). These gadgets typically end in a ret instruction. By carefully crafting a stack of return addresses pointing to these gadgets, an attacker can piece together complex operations. To bypass ASLR, attackers often need an additional information leak vulnerability to find the base address of a library (like libc) from which they can then calculate the addresses of all their needed gadgets.
Incorrect! Try again.
44In a database management system that uses a strict two-phase locking (2PL) protocol for transaction concurrency, which of the four necessary deadlock conditions (Mutual Exclusion, Hold and Wait, No Preemption, Circular Wait) is most practically and commonly addressed to prevent deadlocks without fundamentally violating the principles of 2PL?
Deadlock Prevention
Hard
A.Violating No Preemption by forcibly taking a lock from one transaction and giving it to another.
B.Violating Hold and Wait by requiring transactions to acquire all locks before starting.
C.Violating Mutual Exclusion by allowing shared locks for all data items.
D.Violating Circular Wait by imposing a total ordering of all lockable data items or using timestamps (e.g., Wait-Die scheme).
Correct Answer: Violating Circular Wait by imposing a total ordering of all lockable data items or using timestamps (e.g., Wait-Die scheme).
Explanation:
This question requires synthesizing knowledge of deadlocks and database concurrency protocols.
Mutual Exclusion cannot be violated as data items need exclusive access for writes to ensure consistency.
Hold and Wait is essential to 2PL's growing phase. Requiring all locks upfront (Option B) is a valid prevention strategy, but it severely reduces concurrency and is often impractical as the full lock set may not be known in advance.
No Preemption is critical for transaction atomicity. Forcibly taking a lock would require the preempted transaction to be aborted and rolled back. While this is a form of recovery, it's not the primary prevention method integrated with 2PL.
Circular Wait is the most common condition to attack for prevention in this context. Schemes like timestamp-based protocols (Wait-Die, Wound-Wait) or graph-based protocols ensure that a cycle of waiting transactions can never form. For example, in Wait-Die, an older transaction will never wait for a younger one; instead, the younger one is aborted. This prevents a circular dependency from ever forming while still allowing the hold-and-wait behavior of 2PL.
Incorrect! Try again.
45A system stores user passwords using the following scheme: StoredHash = SHA256(PerUserSalt + UserPassword). An attacker gains read-only access to the user database, including usernames, salts, and the stored hashes. Which of the following attack vectors is rendered ineffective by this scheme, while which remains a primary threat?
Authentication-Password based Authentication
Hard
A.Ineffective: Rainbow table attacks; Primary Threat: Offline dictionary/brute-force attacks on a per-user basis.
B.Ineffective: Brute-force attacks; Primary Threat: Social engineering.
Correct Answer: Ineffective: Rainbow table attacks; Primary Threat: Offline dictionary/brute-force attacks on a per-user basis.
Explanation:
The use of a unique salt for each user (PerUserSalt) is a critical security measure. A rainbow table is a precomputed table of hashes for common passwords. It is only effective if the hash is computed on the password alone (or with a common, non-unique salt). Because each user has a different salt, the attacker would need a separate rainbow table for every single user, which is computationally infeasible. Thus, rainbow table attacks are rendered ineffective. However, since the attacker has the salt and the final hash for each user, they can perform an offline dictionary or brute-force attack against individual users. For a specific user (e.g., 'admin'), the attacker can take a list of common passwords, prepend the user's known salt, hash the result, and compare it to the stored hash. This must be done one user at a time, but it is still a very potent threat for users with weak passwords.
Incorrect! Try again.
46A system has detected a deadlock involving four processes (P1, P2, P3, P4) with the following properties:
Assuming the cost of termination is proportional to (100 - %complete) * priority_level and the goal is to minimize this immediate cost, which process is the optimal victim to terminate?
Deadlock Recovery
Hard
A.P4, because terminating it would release the most resources.
B.P3, because despite being almost done, its low priority makes it a cheap rollback candidate.
C.P1, because it holds the fewest resources.
D.P2, because it has the lowest priority and has completed the least amount of work.
Correct Answer: P2, because it has the lowest priority and has completed the least amount of work.
Explanation:
P1: High priority and 80% done. Very expensive to kill.
P2: Low priority and only 10% done. Very cheap to kill in terms of work lost.
P3: Low priority but 90% done. Killing it would waste a lot of computation.
P4: Medium priority, 50% done, holds many resources. Killing it is beneficial for resource release, but the cost is moderate.
Comparing P2 and P3, both are low priority. P2 has only done 10% of its work, while P3 has done 90%. It is almost always better to terminate P2 and lose only 10% of the work than to terminate P3 and lose 90% of its work. The number of resources held is also a factor, but progress and priority are often weighted more heavily. Higher is more expensive.
Cost(P1) = 80 * 3 = 240.
Cost(P2) = 10 * 1 = 10.
Cost(P3) = 90 * 1 = 90.
Cost(P4) = 50 * 2 = 100.
With this standard cost heuristic, P2 is by far the cheapest process to terminate. I'll rephrase the question to be less about a formula and more about these standard heuristics.
New Question: "...Which process is the optimal victim to terminate to resolve the deadlock based on common heuristics that seek to minimize wasted computation and respect process priority?"
The correct answer is P2. The explanation: "Common heuristics for victim selection prioritize terminating processes that have consumed the least amount of CPU time (i.e., are least complete) and have the lowest priority. P2 fits both criteria perfectly: it is low priority and only 10% complete, meaning terminating it wastes the least amount of work. While P4 holds more resources, the computational cost of restarting it is much higher. P1 is a very poor candidate due to its high priority and progress."
Incorrect! Try again.
47A kernel-level device driver for a high-speed network card needs to directly write received packets into a pre-allocated memory buffer for a user-space application. To implement this with the Principle of Least Privilege, which hardware-assisted mechanism is most appropriate to prevent the device driver or the network card itself from accessing arbitrary physical memory?
Principles of protection
Hard
A.Utilizing an I/O Memory Management Unit (IOMMU) to restrict device memory access to specific physical pages.
B.Running the device driver in a lower CPU privilege ring (e.g., Ring 1) than the main kernel.
C.Using separate kernel and user address spaces.
D.Implementing system call gates for controlled entry into the kernel.
Correct Answer: Utilizing an I/O Memory Management Unit (IOMMU) to restrict device memory access to specific physical pages.
Explanation:
This question targets a specific, advanced hardware protection mechanism. While all options are security features, the IOMMU is the most direct and appropriate answer. The Principle of Least Privilege dictates that a component should only have access to the resources it strictly requires. The network card, via Direct Memory Access (DMA), could potentially write to any physical memory location. An IOMMU acts like a regular MMU but for I/O devices. It creates a separate I/O address space and translates device-visible addresses to physical addresses. The OS can configure the IOMMU to only allow the network card to 'see' and write to the specific physical memory pages corresponding to the designated buffer, thus preventing it from corrupting the kernel or other processes. The other options are less relevant: separating address spaces protects processes from each other, not the kernel from a malicious/faulty device; system calls are for user-space to kernel-space transitions; and privilege rings separate software components, but don't directly control a hardware device's DMA access.
Incorrect! Try again.
48In a system containing resource R1 with 2 instances and resource R2 with 2 instances, consider the following sequence of events:
1. P1 requests and gets an instance of R1.
2. P2 requests and gets an instance of R2.
3. P3 requests and gets an instance of R1.
4. P1 requests an instance of R2 and waits.
5. P2 requests an instance of R1 and waits.
Which statement accurately describes the system state?
Deadlock Characterization
Hard
A.A deadlock exists, but it involves P3, not just P1 and P2.
B.The system state is unsafe, but not necessarily deadlocked, as P3's future behavior is unknown.
C.The system is not deadlocked because P3 can release R1, allowing P2 to proceed, which then allows P1 to proceed.
D.The system is deadlocked because a cycle (P1 → R2 → P2 → R1 → P1) exists in the resource-allocation graph.
Correct Answer: The system is not deadlocked because P3 can release R1, allowing P2 to proceed, which then allows P1 to proceed.
Explanation:
Let's assume R2 has only 1 instance.
P1 gets R1. 2. P2 gets R2. 3. P3 gets R1. 4. P1 requests R2 and waits (correct, P2 holds it). 5. P2 requests R1 and waits (correct, P1 and P3 hold them).
Now, the state is: P1 holds R1, wants R2. P2 holds R2, wants R1. P3 holds R1, is not waiting. A cycle P1 → R2 → P2 → R1 exists. Is it a deadlock? No. P3 is not part of the cycle and can continue execution. Eventually, P3 will finish and release its instance of R1. This released instance can be allocated to P2. P2 can then run to completion and release R1 and R2. P1 can then get R2 and complete. Therefore, no deadlock exists. The system can follow the execution path <P3, P2, P1> to resolve the waits.
Incorrect! Try again.
49A disgruntled employee embeds a hidden piece of code within a critical financial reporting application. The code is designed to activate and scramble the database tables only if the employee's own user account is deleted from the company's active directory. This type of malicious code is best classified as a:
Program Threats
Hard
A.Trojan Horse
B.Rootkit
C.Logic Bomb
D.Worm
Correct Answer: Logic Bomb
Explanation:
This question requires distinguishing between specific types of program threats based on their trigger mechanism and behavior.
A Trojan Horse is malware disguised as a legitimate program. While this code is hidden within a legitimate application, its defining characteristic is its trigger.
A Logic Bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. The trigger condition here ('employee's user account is deleted') is a specific logical condition, not just the execution of the host program. This is the classic definition of a logic bomb.
A Worm is a standalone malware that replicates itself to spread to other computers. This code does not self-replicate.
A Rootkit is designed to conceal its own presence or the presence of other malware, often by modifying the host operating system. This code does not attempt to hide itself in this manner.
Incorrect! Try again.
50In a system with a strict, preemptive priority-based scheduler, a continuously running, low-priority process P_low requires periodic access to a resource R protected by a mutex. A stream of high-priority processes P_high also frequently need and release R. Even if the mutex uses a fair (e.g., FIFO) queue for waiting processes, why is P_low still highly susceptible to starvation?
Starvation
Hard
A.Because P_low may never get enough CPU time to even make the request for the mutex, as it is constantly being preempted by the P_high processes.
B.Because P_low will be preempted by a P_high process after it has been granted the mutex but before it can finish its critical section.
C.Because the FIFO queue for the mutex does not account for process priorities, leading to priority inversion.
D.Because the high-priority processes will form a convoy, blocking the mutex indefinitely.
Correct Answer: Because P_low may never get enough CPU time to even make the request for the mutex, as it is constantly being preempted by the P_high processes.
Explanation:
This is a subtle question about the interplay between CPU scheduling and resource locking, which is a common cause of starvation. While priority inversion (Option C) is a real problem, the question states the mutex queue is fair. The core issue here is CPU starvation, not lock starvation. With a strict priority scheduler, as long as there is any P_high process ready to run, P_low will never be scheduled. If the stream of P_high processes is dense enough, P_low will not even get the CPU cycles needed to execute its code up to the point where it would lock(R). It is starved of CPU time itself, making its need for the resource moot. The other options describe related problems, but not the primary cause of starvation in this specific scenario.
Incorrect! Try again.
51Consider an access matrix system with the copy right. If a process in Domain D1 has a read* (read with copy) right for an object O, it can copy the read right into another domain's, say D2's, column for O. Suppose the original read* right in D1 is later revoked. In a standard capability-based implementation, what happens to the read right that D1 previously gave to D2?
Access matrix
Hard
A.The read right in D2 persists, as the copy operation was a one-time grant and is not linked to the original right.
B.The read right in D2 is automatically and immediately revoked due to the dependency.
C.Revocation of D1's right fails because it has been copied, preventing an inconsistent state.
D.The read right in D2 becomes a 'dangling' capability, causing a system fault when D2 next tries to use it.
Correct Answer: The read right in D2 persists, as the copy operation was a one-time grant and is not linked to the original right.
Explanation:
This question explores the difficult problem of revocation in capability systems. In a pure capability system, capabilities are like keys; once you have a key, it works. When D1 exercises its copy right, it essentially forges a new, independent capability (a read right for O) and places it in D2's list. This new capability has no backward reference or dependency on D1's original read* capability. Therefore, revoking the right from D1 has no effect on the right that D2 now possesses. This is a major security challenge in such systems and is why managing revocation is complex, often requiring indirect capabilities (where the OS can invalidate an intermediate object) rather than direct ones.
Incorrect! Try again.
52An attacker captures gigabytes of TLS-encrypted traffic between a user and a bank. One year later, the bank's long-term RSA private key is compromised. The attacker finds they cannot decrypt the captured sessions. This resilience is due to the session key exchange protocol having a property known as:
Secure Communication
Hard
A.Message Authentication Codes (MAC)
B.Certificate Pinning
C.Symmetric-key Cryptography
D.Perfect Forward Secrecy (PFS)
Correct Answer: Perfect Forward Secrecy (PFS)
Explanation:
This question tests a crucial concept in modern cryptography. Perfect Forward Secrecy (PFS) is a property of key agreement protocols that ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the long-term private keys is compromised in the future. Protocols like Ephemeral Diffie-Hellman (DHE/ECDHE) provide PFS. They generate a new, temporary private key for every session, use it to negotiate the symmetric session key, and then discard it. The server's long-term RSA key is only used for signing the ephemeral parameters to authenticate itself. Therefore, even if the long-term key is later stolen, it cannot be used to derive the discarded session keys of past communications. In contrast, if the session key was directly encrypted with the server's long-term RSA key, compromising that key would compromise all past sessions.
Incorrect! Try again.
53In the UNIX operating system, a program owned by the root user has the setuid bit enabled. When a non-privileged user alice executes this program, the resulting process has a Real User ID (RUID) and an Effective User ID (EUID). Which of the following statements accurately describes the state of the process's domain and privileges?
Domain of protection
Hard
A.The RUID is alice and the EUID is root. The process has root privileges for the duration of its execution.
B.The RUID is root and the EUID is alice. The process has root privileges.
C.Both the RUID and EUID are set to root, completely severing the link to the original user alice.
D.The RUID is alice and the EUID is alice, but the process is granted a special capability to perform root-level actions.
Correct Answer: The RUID is alice and the EUID is root. The process has root privileges for the duration of its execution.
Explanation:
The setuid mechanism in UNIX is a classic example of a temporary domain switch.
The Real User ID (RUID) identifies the user who actually launched the process. It remains alice. This is important for accounting and for the process itself to know who its owner is.
The Effective User ID (EUID) is used by the kernel for most permission checks. Because the setuid bit is set on an executable owned by root, the kernel sets the process's EUID to root.
This means that for operations like opening files, the process is treated as if it were root, thereby granting it elevated privileges. The process can, and for security reasons should, drop its effective privileges (e.g., by setting EUID = RUID) as soon as the privileged operation is complete, adhering to the principle of least privilege.
Incorrect! Try again.
54An attacker sends a flood of TCP SYN packets to a server with a spoofed, non-existent source IP address. The server responds with a SYN-ACK to the spoofed address and adds an entry to its TCB (Transmission Control Block) table, waiting for an ACK that will never arrive. This exhausts the server's TCB table, preventing legitimate users from connecting. This attack is a:
System and network threats
Hard
A.Teardrop Attack
B.Smurf Attack
C.TCP SYN Flood Attack
D.Man-in-the-Middle Attack
Correct Answer: TCP SYN Flood Attack
Explanation:
This describes the classic TCP SYN Flood, a type of Denial of Service (DoS) attack. It specifically exploits the stateful nature of the TCP three-way handshake. By sending SYN packets from spoofed IPs, the attacker forces the server to allocate resources (a TCB entry and memory) for a half-open connection. Because the final ACK never arrives from the non-existent source, these resources remain tied up until a timeout occurs. By sending these packets at a high rate, the attacker can fill the server's backlog queue or TCB table, preventing it from accepting new, legitimate connections.
A Smurf attack uses spoofed ICMP requests to a broadcast address.
A Teardrop attack involves sending fragmented IP packets that are impossible to reassemble.
A Man-in-the-Middle attack involves intercepting and relaying communication between two parties.
Incorrect! Try again.
55What is the computational complexity of the Banker's Algorithm's safety check, where n is the number of processes and m is the number of resource types?
Deadlock Avoidance & Detection
Hard
A.O(n * m)
B.O(n * m^2)
C.O(n + m)
D.O(m * n^2)
Correct Answer: O(m * n^2)
Explanation:
This question requires analyzing the algorithm used for deadlock avoidance. The safety algorithm works as follows:
Initialize a Work vector of length m and a Finish vector of length n.
Find a process i such that Finish[i] is false and its Need vector is less than or equal to the Work vector. This search loop runs up to n times. The comparison of the Need and Work vectors takes O(m) time. So, one full scan for a suitable process is O(n * m).
If such a process is found, update the Work vector and mark the process as finished. Then, go back to step 2.
In the worst case, we might have to scan the entire list of n processes to find one that can run. After we find one, we have to repeat the scan for the remaining n-1 processes, and so on. This leads to a complexity of roughly (n + (n-1) + (n-2) + ... + 1) scans, each taking O(m) time. The sum is O(n^2). Therefore, the total complexity is O(m * n^2).
Incorrect! Try again.
56A system developer intentionally leaves a hardcoded username/password combination in a network service that grants administrative access, to be used for emergency maintenance. This mechanism is undocumented and bypasses standard authentication channels. This is a classic example of a:
Security Vulnerability like Buffer overflow, Trapdoors, Backdoors, cache poisoning etc
Hard
A.Trapdoor
B.Buffer Overflow
C.Logic Bomb
D.Backdoor
Correct Answer: Trapdoor
Explanation:
The terms Trapdoor and Backdoor are often used interchangeably, but in a strict academic sense, they have a subtle difference. A Trapdoor is a secret entry point intentionally implemented by the original developers, often for debugging or maintenance purposes (as described in the question). A Backdoor is more general and can be a trapdoor, but often refers to a mechanism of access installed by an attacker after a system has been compromised, or any other unauthorized method of access. Given that it was intentionally built in by the original developer, 'Trapdoor' is the more precise and correct term for this scenario.
Incorrect! Try again.
57In a system implementing the access matrix using a global table of triplets <domain, object, rights-set>, what is the primary performance bottleneck when a process frequently switches between domains that have access to a very large number of distinct objects?
Implementation of access matrix
Hard
A.The difficulty of revoking rights for a specific object from all domains.
B.The storage overhead of the large global table itself.
C.The time required to search the entire global table to find all rights for the new domain upon a domain switch.
D.The excessive number of system calls required to modify the table.
Correct Answer: The time required to search the entire global table to find all rights for the new domain upon a domain switch.
Explanation:
This question analyzes the performance trade-offs of a specific access matrix implementation. A global table is simple but does not scale well. When a process switches from Domain A to Domain B, the system needs to know all of B's permissions. With a global table structured as <domain, object, rights>, there is no direct way to look up a domain and get all its rights. The system must perform a linear search through the entire table, picking out all the entries where the domain is 'B'. If the table and the number of objects are very large, this search becomes a significant performance bottleneck for the domain switch operation. The storage overhead (A) is a problem, but the search time (C) is the critical operational bottleneck. Revocation (B) is also difficult, but the question specifically asks about the impact of domain switching.
Incorrect! Try again.
58A 'man-in-the-middle' attack where an adversary intercepts and modifies messages between two parties without their knowledge is a direct violation of which two fundamental security goals?
Goals of protection
Hard
A.Confidentiality and Non-repudiation
B.Availability and Integrity
C.Confidentiality and Availability
D.Integrity and Authenticity
Correct Answer: Integrity and Authenticity
Explanation:
This question requires a precise understanding of the security goals.
Confidentiality means preventing the unauthorized disclosure of information. While a MITM attacker can violate this by reading messages, their defining action is modification.
Integrity means ensuring that data is not altered in an unauthorized manner. By modifying messages in transit, the attacker directly violates data integrity.
Authenticity is the verification of the identity of a user or system. The MITM attack fundamentally breaks authenticity because each party believes they are communicating directly with the legitimate partner, when in fact they are communicating with the attacker. The attacker is impersonating each party to the other.
Availability is ensuring that systems and data are accessible when needed. A MITM attack does not necessarily cause a denial of service.
Therefore, Integrity (the what) and Authenticity (the who) are the two goals most directly and fundamentally violated by this attack.
Incorrect! Try again.
59A malware strain infects executable files on a system. When an infected program is run, the malware code activates, but instead of containing the entire malicious payload itself, it uses a multi-stage process. The initial code (the 'dropper') contains just enough logic to connect to a remote command-and-control server, download the main malicious payload into memory, and then execute it. What is the primary advantage of this multi-stage approach for the malware author?
Application Security - Virus, Program Threats
Hard
A.It allows the malware to function as a worm and spread more rapidly.
B.It ensures the malware can only infect systems with a network connection.
C.It reduces the initial size of the infected file, making it harder to detect by static signature-based antivirus scanners.
D.It improves the execution speed of the malicious payload by loading it directly into RAM.
Correct Answer: It reduces the initial size of the infected file, making it harder to detect by static signature-based antivirus scanners.
Explanation:
This technique, known as a multi-stage payload or a 'dropper/downloader', is a common evasion tactic. Static antivirus scanners work by looking for known patterns or 'signatures' of malware within files. By keeping the initial infected portion (the dropper) very small and simple, with minimal suspicious code, the malware author can more easily evade these signature-based checks. The dropper's main job is just to download the next stage. Furthermore, the main payload can be easily updated on the server, allowing the attacker to change tactics without needing to re-infect the target. This makes the malware polymorphic and much harder to stamp out. The small, innocuous-looking initial stage is the key to evading initial detection.
Incorrect! Try again.
60In a system where a process can have its resources preempted (e.g., its memory pages swapped to disk), but only if its state can be saved and restored later without loss, which of the four necessary conditions for deadlock is being strategically broken or relaxed?
Deadlock Characterization
Hard
A.No Preemption
B.Mutual Exclusion
C.Circular Wait
D.Hold and Wait
Correct Answer: No Preemption
Explanation:
The four necessary conditions are Mutual Exclusion, Hold and Wait, No Preemption, and Circular Wait. The 'No Preemption' condition states that a resource can only be released voluntarily by the process holding it, after that process has completed its task. The scenario described directly violates this principle. The operating system is forcibly taking a resource (memory) from a process. However, it does so in a controlled manner by saving the process's state (rolling it back) so it can be resumed later. This is a practical relaxation of the strict 'no preemption' rule. It's not breaking mutual exclusion (the memory is for one process at a time), hold and wait (the process still holds other resources while waiting for memory to be paged back in), or circular wait (this action doesn't impose an ordering on requests).