Which of the following is not a correct statement about malware?
Answer
Worm needs a host file to replicate itself
Virus is a software program
Worm spread relying on security vulnerability of network or target computer
Worm often drop malicious payloads such as backdoor
Question 2
Question
Which of the following does not constitute common scenario of email phishing?
Answer
Email Spoofing
Pharming
Social Engineering
Asking for typing in private information either in email contents or in fake webpages
Question 3
Question
Which of the following does not constitute the 3 common methods for authentication?
Answer
Something people know about you
Something about you
Something you have
Something you know
Question 4
Question
Although any domain name can be affected (e.g., DNS cache poisoning attack), which of the following domain names is most likely to be an official ERAU website ?
Answer
http://www.cfss.edu/erau
http://cfs.erau.edu/donation
http://www.erau.edu@212.223.23.22/inex.html
http://erau.cfs.edu/erau
Question 5
Question
Which of the following is not considered a two factor authentication?
Answer
authentication through "something you know" plus "something you have"
authentication through "something you know" plus "something about you"
authentication through "password" and "id card"
authentication through entering password twice
Question 6
Question
Which of the following refers to a routing of connection requests to a false website?
Answer
Spoofing
Pharming
Baiting
Denial of Service
Question 7
Question
Disrupt Computer Operation
Answer
VIRUSES
SPYWARE
BACKDOORS
Question 8
Question
Collect Sensitive Information
Answer
VIRUSES
SPYWARE
BACKDOORS
Question 9
Question
Gain Access to others' system
Answer
VIRUSES
SPYWARE
BACKDOORS
Question 10
Question
One of the major cryptography objectives is to ensure that a message of a party to another should not be altered by unintended 3rd party. Which of the following indicates this concept?
Answer
Confidentiality
Integrity
Authenticity
Non-repudiation
Question 11
Question
Which of the followings represents the concept that the receiver can be ensured that sender is clearly the one who claims he/she is?