Zusammenfassung der Ressource
Frage 1
Frage
Which of the following is not a correct statement about malware?
Antworten
-
Worm needs a host file to replicate itself
-
Virus is a software program
-
Worm spread relying on security vulnerability of network or target computer
-
Worm often drop malicious payloads such as backdoor
Frage 2
Frage
Which of the following does not constitute common scenario of email phishing?
Frage 3
Frage
Which of the following does not constitute the 3 common methods for authentication?
Frage 4
Frage
Although any domain name can be affected (e.g., DNS cache poisoning attack), which of the following domain names is most likely to be an official ERAU website ?
Frage 5
Frage
Which of the following is not considered a two factor authentication?
Antworten
-
authentication through "something you know" plus "something you have"
-
authentication through "something you know" plus "something about you"
-
authentication through "password" and "id card"
-
authentication through entering password twice
Frage 6
Frage
Which of the following refers to a routing of connection requests to a false website?
Antworten
-
Spoofing
-
Pharming
-
Baiting
-
Denial of Service
Frage 7
Frage
Disrupt Computer Operation
Antworten
-
VIRUSES
-
SPYWARE
-
BACKDOORS
Frage 8
Frage
Collect Sensitive Information
Antworten
-
VIRUSES
-
SPYWARE
-
BACKDOORS
Frage 9
Frage
Gain Access to others' system
Antworten
-
VIRUSES
-
SPYWARE
-
BACKDOORS
Frage 10
Frage
One of the major cryptography objectives is to ensure that a message of a party to another should not be altered by unintended 3rd party. Which of the following indicates this concept?
Antworten
-
Confidentiality
-
Integrity
-
Authenticity
-
Non-repudiation
Frage 11
Frage
Which of the followings represents the concept that the receiver can be ensured that sender is clearly the one who claims he/she is?
Antworten
-
Confidentiality
-
Integrity
-
Authenticity
-
Non-repudiation