Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

TRUE/FALSE QUESTIONS: 1. The Zotob worm, which took advantage of a vulnerability

ID: 3804910 • Letter: T

Question

TRUE/FALSE QUESTIONS:

1.   The Zotob worm, which took advantage of a vulnerability in Microsoft Plug and Play (PnP) and which was accessible through RPC, did not affect Windows XP SP2, even the coding bug was there.

2.   Key issues from a software security perspective are whether the implemented algorithm correctly solves the specified problem, whether the machine instructions executed correctly represent the high level algorithm specification, and whether the manipulation of data values in variables is valid and meaningful.

3.   Packet sniffers are seldom used to retrieve sensitive information like usernames and passwords.

4.   Buffer overflows can be found in a wide variety of programs.

5. EFS allows files and directories to be encrypted and decrypted transparently for authorized users. All versions of Windows since Windows 2000 support Encryption File System.

Explanation / Answer

1.False

2. False

3.True

4.True

Buffer overflows can be found in a wide variety of programs

5.True