Tuesday, March 14, 2017

Cryptography: Basic Quiz - Virus/Trojans

Start your future on Coursera today. Coursera Business Vertical Orange Design 10  
What is the easiest method to get a password?

Brute-force cracking

Guessing

Dictionary attack

Hybrid attack


Which of the following is a passive online attack?

Password guessing

Network sniffing

Brute-force attack

Dictionary attack

How do you remove a Trojan from a system?

Search the Internet for freeware removal tools.

Purchase commercially available tools to remove the Trojan.

Reboot the system.

Uninstall and reinstall all applications.

Coursera DS Design 10 Coursera AH Purple Design 2 Coursera General Design 2 Green

What is the difference between a backdoor and a Trojan?

A Trojan usually provides a backdoor for a hacker.

A backdoor must be installed first.

A Trojan is not a way to access a system.

A backdoor is provided only through a virus, not through a Trojan.

What type of virus modifies itself to avoid detection?

Stealth virus

Polymorphic virus

Multipartite virus

Armored virus


What is a covert channel?

Using a communications channel in a way that was not intended

Tunneling software

A Trojan removal tool

Using a communications channel in the original, intended way

Which of the following are the best indications of a virus attack? (Choose all that apply.)

Any anomalous behavior

Unusual program opening or closing

Strange pop-up messages

Normal system operations as most viruses run in the background

Coursera - Hundreds of Specializations and courses in business, computer science, data science, and more Business and Financial Modeling from the Wharton School
What components of a system do viruses infect? (Choose all that apply.)
Files

System sectors

Memory

CPU

DLL files

What is cryptography?

The study of computer science

The study of mathematics

The study of encryption

The creation of encryption algorithms

What is the process of changing the order of some characters in an encryption key?

Transposition

Subtraction

Substitution

Transrelation

How many keys exist in a public/private key pair?

A. 1 B. 2 C. 3 D. 4

Coursera Data Science Coursera Business Vertical
Which cryptographic attack attempts to crack the code by looking for patterns and using statistical analysis?

Cipher text–only attack

Chosen–plain text attack

Chosen–cipher text attack

Brute-force attack



What is the goal of a known–plain text attack?

To read the encrypted data

To gain access to the public key

To discover the encryption key

To validate the sender of the data

Why would hackers want to cover their tracks?

To prevent another person from using the programs they have installed on a target sys-

tem

To prevent detection or discovery

To prevent hacking attempts

To keep other hackers from using their tools

What is the process of hiding text within an image called?

Steganography

Encryption

Spyware

Keystroke logging

What is privilege escalation?

Creating a user account with higher privileges

Creating a user account with administrator privileges

Creating two user accounts: one with high privileges and one with lower privileges

Increasing privileges on a user account
Step forward in 2017: Build in-demand career skills with Coursera Step forward in 2017: Build in-demand career skills with Coursera Step forward in 2017: Build in-demand career skills with Coursera

1 comment: