100% Zufriedenheitsgarantie Sofort verfügbar nach Zahlung Sowohl online als auch als PDF Du bist an nichts gebunden 4.2 TrustPilot
logo-home
Prüfung

IT Security: Defense against the digital dark arts. Week1: Understanding Security Threats

Bewertung
-
Verkauft
-
seiten
6
Klasse
A+
Hochgeladen auf
07-05-2024
geschrieben in
2023/2024

In the CIA Triad, "Confidentiality" means ensuring that data is: not accessible by unwanted parties; "Confidentiality," in this context, means preventing unauthorized third parties from gaining access to the data. In the CIA Triad, "Integrity" means ensuring that data is: accurate and was not tampered with; "Integrity," in this context, means ensuring that the data remains intact, uncorrupted, and not tampered with. The data that gets sent is the exact same as the data that gets received. In the CIA Triad, "Availability" means ensuring that data is: available and people can access it; "Availability," in this context, means ensuring that data and services remain accessible to those who are authorized to access them. What's the relationship between a vulnerability and an exploit? an exploit takes advantage of a vulnerability to run arbitrary code or gain access; A vulnerability is a bug or hole in a system. It allows an attacker to gain access by using an exploit, which takes advantage of the vulnerability. Which statement is true for both a worm and a virus? they're self-replicating and selfpropagating; Both worms and viruses are capable of spreading themselves using a variety of transmission means. Check all examples of types of malware: worms adware viruses; These three are all examples of unwanted software that can cause adverse affects to an infected system, which is exactly what malware isWhat are the characteristics of a rootkit? Check all that apply. Is difficult to detect; A rootkit is designed to provide administrator-level access to a third party without the system owner's knowledge. Given this, rootkits are usually designed to avoid detection and can be difficult to detect. provides elevated credentials; A rootkit is designed to provide administrator-level access to a third party without the system owner's knowledge. Given this, rootkits are usually designed to avoid detection and can be difficult to detect. What are the dangers of a man-in-the-middle attack? Check all that apply. an attacker can modify traffic in transit an attacker can block or redirect traffic an attacker can eavesdrop on unencrypted traffic; A man-in-the-middle attack means that the attacker has access to your network traffic. This allows them to eavesdrop, modify traffic in transit, or block traffic entirely. Yikes! Why is a DNS cache poisoning attack dangerous? Check all that apply. It affects any clients querying the poisoned DNS server it allows an attacker to redirect targets to malicious web servers; By inserting fake DNS records into a DNS server's cache, every client that queries this record will be served the fake information. This allows an attacker to redirect clients to a web server of their choosing. Which of the following is true of a DDoS attack? Attack traffic comes from lots of different hosts; The "Distributed" in DDoS means that the attack traffic is distributed across a large number of hosts, resulting in the attack coming from many different machines.

Mehr anzeigen Weniger lesen
Hochschule
IT Security: Defense Against The Digital Dark Arts
Kurs
IT Security: Defense against the digital dark arts









Ups! Dein Dokument kann gerade nicht geladen werden. Versuch es erneut oder kontaktiere den Support.

Schule, Studium & Fach

Hochschule
IT Security: Defense against the digital dark arts
Kurs
IT Security: Defense against the digital dark arts

Dokument Information

Hochgeladen auf
7. mai 2024
Anzahl der Seiten
6
geschrieben in
2023/2024
Typ
Prüfung
Enthält
Fragen & Antworten

Themen

8,32 €
Vollständigen Zugriff auf das Dokument erhalten:

100% Zufriedenheitsgarantie
Sofort verfügbar nach Zahlung
Sowohl online als auch als PDF
Du bist an nichts gebunden

Lerne den Verkäufer kennen
Seller avatar
rickyenzo329

Lerne den Verkäufer kennen

Seller avatar
rickyenzo329 Harvard University
Folgen Sie müssen sich einloggen, um Studenten oder Kursen zu folgen.
Verkauft
0
Mitglied seit
1 Jahren
Anzahl der Follower
0
Dokumente
521
Zuletzt verkauft
-
Ace prep Exams

0,0

0 rezensionen

5
0
4
0
3
0
2
0
1
0

Kürzlich von dir angesehen.

Warum sich Studierende für Stuvia entscheiden

on Mitstudent*innen erstellt, durch Bewertungen verifiziert

Geschrieben von Student*innen, die bestanden haben und bewertet von anderen, die diese Studiendokumente verwendet haben.

Nicht zufrieden? Wähle ein anderes Dokument

Kein Problem! Du kannst direkt ein anderes Dokument wählen, das besser zu dem passt, was du suchst.

Bezahle wie du möchtest, fange sofort an zu lernen

Kein Abonnement, keine Verpflichtungen. Bezahle wie gewohnt per Kreditkarte oder Sofort und lade dein PDF-Dokument sofort herunter.

Student with book image

“Gekauft, heruntergeladen und bestanden. So einfach kann es sein.”

Alisha Student

Häufig gestellte Fragen