1 / 5

Midterm 2 Exam Review

Midterm 2 Exam Review. Release questions via webcourse “assignment” around 2pm, Wednesday Mar. 28th, due via webcourse at 2pm, next day Submit format: Word file, PDF file Scanned answer sheets Make sure your writing is large and readable, file names show page number

Download Presentation

Midterm 2 Exam Review

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Midterm 2 Exam Review • Release questions via webcourse “assignment” around 2pm, Wednesday Mar. 28th, due via webcourse at 2pm, next day • Submit format: • Word file, PDF file • Scanned answer sheets • Make sure your writing is large and readable, file names show page number • Photos of your answer sheets if you have no scanner • Make sure it is readable, file names show page number • You can resubmit, so submit first version early! • Don’t wait until the last one hour to submit! • No excuse of not being able to submit! (unless webcourse is down for the all day on Mar. 29th) • From 2pm to 3:45pm on Mar. 28th, you can call me for any questions related to exam problems • Office number: 407-823-5015 (HEC 243)

  2. Exam Coverage • All questions in previous three homework and the email spam assignment • All questions in mid-term 1 exam • All examples given in this review lecture • Try to go over my lecture notes after mid-term 1 exam • Use textbook as reference

  3. Question Types • Knowledge questions • True or false statement (explain why) • Protocols • Calculations

  4. Knowledge Question Examples • What port is used by SMTP protocol? By HTTP protocol? By HTTPS protocol? • When a user reads his/her email, is the “From:” field shows the email address from “Mail from:” command, or from the “from:” line in Data command? • What is RBL? (realtime blackhole list) • What are the two sender verification techniques introduced in class? Which one use public key? • What is the biggest hurdle for “pwdHash” to be really implemented? • Why in KaZaA there are so many virus-infected files? • What is the major differences between polymorphic virus and metamorphic viruse?

  5. Knowledge Question Examples • What is IRC? • Among Agobot, SDBot, SpyBot, GT Bot, which one has no malicious code in it? • Why centralized C&C botnets are very hard to shut down by defenders? Why peer-to-peer botnets are even harder to shut down? • What are the two running mode of rootkits? • Why rootkitrevealer can detect rootkits that hide malicious files on hard drive? • What is a Trojan horse? Adware? Spyware?

More Related