Podcast
Questions and Answers
Which university did Samer graduate from in 2003?
Which university did Samer graduate from in 2003?
- Aleppo University (correct)
- No information provided
- Unknown University
- Toulouse University
What is Samer's preferred name?
What is Samer's preferred name?
- Ronaldo
- Wazan
- Ahmad
- Samer (correct)
During which years did Samer work with Ronaldo Mouchawar in Aleppo?
During which years did Samer work with Ronaldo Mouchawar in Aleppo?
- 2007-2011
- 2003-2006 (correct)
- No information provided
- Unknown years
Which university awarded Samer his Master and PhD degrees?
Which university awarded Samer his Master and PhD degrees?
What is the main reference to check before asking any question in the course?
What is the main reference to check before asking any question in the course?
Which category of attackers focuses on gaining unauthorized access to computer systems?
Which category of attackers focuses on gaining unauthorized access to computer systems?
What is the term for unlawful use or duplication of software IP?
What is the term for unlawful use or duplication of software IP?
Which type of malware replicates itself on the same computer?
Which type of malware replicates itself on the same computer?
What is the term for a program that does something other than advertised and contains hidden code that launches an attack?
What is the term for a program that does something other than advertised and contains hidden code that launches an attack?
How do worms spread to other network devices?
How do worms spread to other network devices?
Which of the following is a critical characteristic of information?
Which of the following is a critical characteristic of information?
What is the purpose of authentication in information security?
What is the purpose of authentication in information security?
What is the CIA triad in information security?
What is the CIA triad in information security?
What is the McCumber cube used for in information security?
What is the McCumber cube used for in information security?
What is the purpose of encryption in information security?
What is the purpose of encryption in information security?
Which of the following is a common method of social engineering attack?
Which of the following is a common method of social engineering attack?
What is the main purpose of spam?
What is the main purpose of spam?
What is the term used for the act of digging through trash to find useful information?
What is the term used for the act of digging through trash to find useful information?
What is a buffer overflow?
What is a buffer overflow?
Which security model gives recommendations for information security management?
Which security model gives recommendations for information security management?
Which type of malware is designed to hide actions or presence of other malicious software?
Which type of malware is designed to hide actions or presence of other malicious software?
What is a logic bomb?
What is a logic bomb?
Which type of malware allows an attacker to remotely control an infected computer?
Which type of malware allows an attacker to remotely control an infected computer?
What is the main purpose of spyware?
What is the main purpose of spyware?
What is password cracking?
What is password cracking?
According to the text, what is the definition of security?
According to the text, what is the definition of security?
According to the text, why do we need security in real life?
According to the text, why do we need security in real life?
What is the relation between Computer Security, Network Security, OS Security, and Information Security?
What is the relation between Computer Security, Network Security, OS Security, and Information Security?
According to the text, why are we sure that we will always have attacks in the future?
According to the text, why are we sure that we will always have attacks in the future?
According to the text, what are some examples of security attacks?
According to the text, what are some examples of security attacks?