- (Topic 7)
Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored? (Choose the best answer)
Correct Answer:
C
In cryptography, a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity. A hash function takes a long string (or \'message\') of any length as input and produces a fixed length string as output, sometimes termed a message digest or a digital fingerprint.
- (Topic 8)
To scan a host downstream from a security gateway, Firewalking:
Correct Answer:
B
Firewalking uses a traceroute-like IP packet analysis to determine whether or not a particular packet can pass from the attacker’s host to a destination host through a packet-filtering device. This technique can be used to map ‘open’ or ‘pass through’ ports on a gateway. More over, it can determine whether packets with various control information can pass through a given gateway.
- (Topic 8)
Melissa is a virus that attacks Microsoft Windows platforms. To which category does this virus belong?
Correct Answer:
D
The Melissa macro virus propagates in the form of an email message containing an infected Word document as an attachment.
- (Topic 3)
What is the main disadvantage of the scripting languages as opposed to compiled programming languages?
Correct Answer:
D
- (Topic 3)
Which of the following statements are true regarding N-tier architecture? (Choose two.)
Correct Answer:
AC