Midterm 2 Exam Review - PowerPoint PPT Presentation

1 / 5
About This Presentation
Title:

Midterm 2 Exam Review

Description:

Title: PowerPoint Presentation Author: User Last modified by: Zou Created Date: 1/1/1601 12:00:00 AM Document presentation format: On-screen Show (4:3) – PowerPoint PPT presentation

Number of Views:54
Avg rating:3.0/5.0
Slides: 6
Provided by: csUcfEduc8
Learn more at: http://www.cs.ucf.edu
Category:

less

Transcript and Presenter's Notes

Title: Midterm 2 Exam Review


1
Midterm 2 Exam Review
  • Release questions via webcourse assignment
    around 2pm, Wednesday Mar. 28th, due via
    webcourse at 2pm, next day
  • Submit format
  • Word file, PDF file
  • Scanned answer sheets
  • Make sure your writing is large and readable,
    file names show page number
  • Photos of your answer sheets if you have no
    scanner
  • Make sure it is readable, file names show page
    number
  • You can resubmit, so submit first version early!
  • Dont wait until the last one hour to submit!
  • No excuse of not being able to submit! (unless
    webcourse is down for the all day on Mar. 29th)
  • From 2pm to 345pm on Mar. 28th, you can call me
    for any questions related to exam problems
  • Office number 407-823-5015 (HEC 243)

2
Exam Coverage
  • All questions in previous three homework and the
    email spam assignment
  • All questions in mid-term 1 exam
  • All examples given in this review lecture
  • Try to go over my lecture notes after mid-term 1
    exam
  • Use textbook as reference

3
Question Types
  • Knowledge questions
  • True or false statement (explain why)
  • Protocols
  • Calculations

4
Knowledge Question Examples
  • What port is used by SMTP protocol? By HTTP
    protocol? By HTTPS protocol?
  • When a user reads his/her email, is the From
    field shows the email address from Mail from
    command, or from the from line in Data
    command?
  • What is RBL? (realtime blackhole list)
  • What are the two sender verification techniques
    introduced in class? Which one use public key?
  • What is the biggest hurdle for pwdHash to be
    really implemented?
  • Why in KaZaA there are so many virus-infected
    files?
  • What is the major differences between polymorphic
    virus and metamorphic viruse?

5
Knowledge Question Examples
  • What is IRC?
  • Among Agobot, SDBot, SpyBot, GT Bot, which one
    has no malicious code in it?
  • Why centralized CC botnets are very hard to
    shut down by defenders? Why peer-to-peer botnets
    are even harder to shut down?
  • What are the two running mode of rootkits?
  • Why rootkitrevealer can detect rootkits that hide
    malicious files on hard drive?
  • What is a Trojan horse? Adware? Spyware?
Write a Comment
User Comments (0)
About PowerShow.com