100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Computer Security Fundamentals Question and answers 100% correct 2023

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
18-10-2023
Written in
2023/2024

Computer Security Fundamentals Question and answers 100% correct 2023









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
October 18, 2023
Number of pages
2
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Computer Security Fundamentals
Virus - correct answer Code that self-replicates, spreads rapidly, may or may not have
a malacious payload.

Malware - correct answer Software with a hidden payload which doesn't do what you
expected it to do.

How Can Viruses spread? - correct answer Through network connections: it copies
itself to ther hosts on the network through email other vulnerabilities found by
programmers in the network.

How do you avoid viruses? - correct answer Use a virus scanner, don't open
questionable attachments, and don't believe "Security Alerts"

What is a Trojan Horse? - correct answer A type of virus that is advertised as
something and allows other malacious software programs (keyloggers, spyware, etc)
onto the host computer. May also leave a back door open.

What is a Buffer Overflow Attack? - correct answer Program writes data beyond the
allocated size of a buffer so that it either crashes or loads it into main memory on the
server.

What is spyware? - correct answer ex: keylogger, spying on web cookies
Deployed in a secretive way to obtain private information about the activity or
information of the target host.

What are the legal uses of spyware? - correct answer Parental Monitoring
Monitoring employees in a work setting to keep them on task

What is Rootkit Malware - correct answer Allows someone to remotely take control of
the target computer in order to do activities such as: monitoring traffic or keystrokes,
creating a backdoor, altering log files, and attacking other machines.

What is malacious web-based code? - correct answer Code that is portable to all
operating systems like Java, HTML, etc. Thus, the virus spreads quickly because there
are many targets utilizing the code and spreading it further.

List the six techniques/stages used by (smart) hackers when committing an attack. -
correct answer 1.Recon 2.Passive Scanning 3.Active Scanning 4.Finding
vulernabilities 5.Enumeration 6.Actual Attack

Give some examples of what a hacker may do for reconnaissance - correct answer
There are 2 ways to recon. Passively and Actively.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
STUVIAMAESTRO254 Florida State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
157
Member since
2 year
Number of followers
98
Documents
9326
Last sold
6 days ago
Academic Excellence Hub

At Academic Excellence Hub, we specialize in providing premium academic exam solutions for university students and institutions. Our carefully curated collection of assessments ensures academic excellence, preparation mastery, and success in competitive environments. We pride ourselves on delivering reliable, confidential, and high-quality exam resources tailored to meet the highest academic standards. Empower your academic journey with trusted expertise and unparalleled service.

Read more Read less
2.5

41 reviews

5
4
4
10
3
7
2
2
1
18

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions