Amr-Aboshama / XGeN

An automated Exam Generator using Natural Language Processing Techniques.
1 stars 0 forks source link

Preprocessor Bad Results #18

Closed AymanAzzam closed 3 years ago

AymanAzzam commented 3 years ago

While testing on the Security Book(Malware Chapter), I get the following results which contain \u:

"tf_questions":[{"questions":[{"answer":"T","question":"chapter malicious software 211 types of malicious software backdoor logic bomb trojan horses mobile code multiple threat malware 212 viruses the nature of viruses viruses classification virus kits macro viruses email viruses 213 virus countermeasures antivirus approaches advanced antivirus techniques 214worms the morris worm worm propagation model recent worm attacks state of worm technology mobile phone worms worm countermeasures 215 distributed denial of service attacks ddos attack description constructing the attack network ddos countermeasures 216 recommended reading and websites 217key terms review questions and problems 211."}]},{"questions":[{"answer":"T","question":"A virus is a piece of software that can \u201cinfect\u201dother programs by modify-ing them;the modification includes a copy of the virus program,which canthen go on to infect other programs."},{"answer":"F, Single System -> systems","question":"Perhaps the most sophisticated types of threats to computer Single System are presented byprograms that exploit vulnerabilities in computing Single System."},{"answer":"T","question":"The former,referred to as parasitic,areessentially fragments of programs that cannot exist independently of someactualapplication program,utility,or system program."},{"answer":"T","question":"This chapter begins with a survey of various types of malware,with amore detailed look at the nature of viruses and worms."},{"answer":"T","question":"A denial of service (DoS) attack is an attempt to prevent legitimate usersof a service from using that service."},{"answer":"F, Hardware -> software","question":"\u2014On War,Carl Von ClausewitzKEY POINTS Malicious Hardware is Hardware that is intentionally included or inserted ina system for a harmful purpose."},{"answer":"T","question":"A worm is a program that can replicate A worm and send copies from com-puter to computer across network connections."}]},{"questions":[{"answer":"T","question":"FloodersUsed to attack networked computer systems with a large volume of traffic to carry out adenial-of-service (DoS) attack."},{"answer":"F, Applications -> programs","question":"The former are Applications or fragments of Applications thatare activated by a trigger."},{"answer":"T","question":"Kit (virus generator)Set of tools for generating new viruses automatically."},{"answer":"T","question":"DownloadersProgram that installs other items on a machine that is under attack."},{"answer":"F, Hardware -> software","question":"AdwareAdvertising that is integrated into Hardware can result in pop-up ads or redirection of abrowser to a commercial site."},{"answer":"T","question":"When the code is executed,the virus alsoexecutes."}]}]

AymanAzzam commented 3 years ago

Thanks for the image processing course