Q6

Beschreibung

Q6
Diocar Cruz
Quiz von Diocar Cruz, aktualisiert more than 1 year ago
Diocar Cruz
Erstellt von Diocar Cruz vor mehr als 6 Jahre
18
0

Zusammenfassung der Ressource

Frage 1

Frage
Which of the following is not a correct statement about malware?
Antworten
  • Worm needs a host file to replicate itself
  • Virus is a software program
  • Worm spread relying on security vulnerability of network or target computer
  • Worm often drop malicious payloads such as backdoor

Frage 2

Frage
Which of the following does not constitute common scenario of email phishing?
Antworten
  • Email Spoofing
  • Pharming
  • Social Engineering
  • Asking for typing in private information either in email contents or in fake webpages

Frage 3

Frage
Which of the following does not constitute the 3 common methods for authentication?
Antworten
  • Something people know about you
  • Something about you
  • Something you have
  • Something you know

Frage 4

Frage
Although any domain name can be affected (e.g., DNS cache poisoning attack), which of the following domain names is most likely to be an official ERAU website ?
Antworten
  • http://www.cfss.edu/erau
  • http://cfs.erau.edu/donation
  • http://www.erau.edu@212.223.23.22/inex.html
  • http://erau.cfs.edu/erau

Frage 5

Frage
Which of the following is not considered a two factor authentication?
Antworten
  • authentication through "something you know" plus "something you have"
  • authentication through "something you know" plus "something about you"
  • authentication through "password" and "id card"
  • authentication through entering password twice

Frage 6

Frage
Which of the following refers to a routing of connection requests to a false website?
Antworten
  • Spoofing
  • Pharming
  • Baiting
  • Denial of Service

Frage 7

Frage
Disrupt Computer Operation
Antworten
  • VIRUSES
  • SPYWARE
  • BACKDOORS

Frage 8

Frage
Collect Sensitive Information
Antworten
  • VIRUSES
  • SPYWARE
  • BACKDOORS

Frage 9

Frage
Gain Access to others' system
Antworten
  • VIRUSES
  • SPYWARE
  • BACKDOORS

Frage 10

Frage
One of the major cryptography objectives is to ensure that a message of a party to another should not be altered by unintended 3rd party. Which of the following indicates this concept?
Antworten
  • Confidentiality
  • Integrity
  • Authenticity
  • Non-repudiation

Frage 11

Frage
Which of the followings represents the concept that the receiver can be ensured that sender is clearly the one who claims he/she is?
Antworten
  • Confidentiality
  • Integrity
  • Authenticity
  • Non-repudiation
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr