100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

COB 204 Security Terms Exam Questions and Answers Already Passed

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
10-07-2025
Written in
2024/2025

COB 204 Security Terms Exam Questions and Answers Already Passed any form or type of software that is developed for the primary purpose of causing harm to data, systems, and/or users - Answers malware malicious software that attaches itself to a legitimate file so that it might infect other systems when that file is shared - Answers virus an executable program that appears to be something useful but is actually harmful - Answers trojan horse malicious software that spreads to other systems on the network without the assistance of humans - Answers worms malicious software that collects user information typically without the user's knowledge or consent - Answers spyware malicious software that holds data or a system hostage until an attacker's demands are met - Answers randsomware a device that prevents unauthorized access to a network - Answers firewall the process of transforming plaintext into ciphertext - Answers encryption the process of transforming ciphertext into plaintext - Answers decription an internal network created for the purpose of attracting an attacker - Answers honeynet an authentication method that relies on "something you are" - Answers biometrics authentication relying on "something you have" might use this - Answers JMU ID card when a user enters their authentication credentials only once yet gains access to multiple related systems - Answers single sign-on encryption that requires two mathematically related keys - Answers asymmetric encryption a system that monitors a network, records user access, and categorizes attempts as valid or invalid - Answers Intrusion Detection System (IDS)

Show more Read less
Institution
COB 204 Security
Course
COB 204 Security








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
COB 204 Security
Course
COB 204 Security

Document information

Uploaded on
July 10, 2025
Number of pages
2
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

COB 204 Security Terms Exam Questions and Answers Already Passed

any form or type of software that is developed for the primary purpose of causing harm to data,
systems, and/or users - Answers malware

malicious software that attaches itself to a legitimate file so that it might infect other systems when that
file is shared - Answers virus

an executable program that appears to be something useful but is actually harmful - Answers trojan
horse

malicious software that spreads to other systems on the network without the assistance of humans -
Answers worms

malicious software that collects user information typically without the user's knowledge or consent -
Answers spyware

malicious software that holds data or a system hostage until an attacker's demands are met - Answers
randsomware

a device that prevents unauthorized access to a network - Answers firewall

the process of transforming plaintext into ciphertext - Answers encryption

the process of transforming ciphertext into plaintext - Answers decription

an internal network created for the purpose of attracting an attacker - Answers honeynet

an authentication method that relies on "something you are" - Answers biometrics

authentication relying on "something you have" might use this - Answers JMU ID card

when a user enters their authentication credentials only once yet gains access to multiple related
systems - Answers single sign-on

encryption that requires two mathematically related keys - Answers asymmetric encryption

a system that monitors a network, records user access, and categorizes attempts as valid or invalid -
Answers Intrusion Detection System (IDS)

when a computer criminal replaces a legitimate program with an unauthorized program for malicious
purposes - Answers userpation

when someones deceives by pretending to be someone else - Answers pretexting

when an attacker sends an email that appears to have come from a legitimate sender that requests
confidential data from the receiver - Answers phishing

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
joshuawesonga22 Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
28
Member since
7 months
Number of followers
1
Documents
10316
Last sold
3 hours ago
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3.3

3 reviews

5
1
4
0
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions