100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

IT Security| Question and Answers (A+ guide solution)

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
21-06-2023
Written in
2022/2023

In the CIA Triad, "Confidentiality" means ensuring that data is: - not accessible by unwanted parties; "Confidentiality," in this context, means preventing unauthorized third parties from gaining access to the data. In the CIA Triad, "Integrity" means ensuring that data is: - accurate and was not tampered with; "Integrity," in this context, means ensuring that the data remains intact, uncorrupted, and not tampered with. The data that gets sent is the exact same as the data that gets received. In the CIA Triad, "Availability" means ensuring that data is: - available and people can access it; "Availability," in this context, means ensuring that data and services remain accessible to those who are authorized to access them. What's the relationship between a vulnerability and an exploit? - an exploit takes advantage of a vulnerability to run arbitrary code or gain access; A vulnerability is a bug or hole in a system. It allows an attacker to gain access by using an exploit, which takes advantage of the vulnerability. Which statement is true for both a worm and a virus? - they're self-replicating and self-propagating; Both worms and viruses are capable of spreading themselves using a variety of transmission means. Check all examples of types of malware: - worms adware viruses; These three are all examples of unwanted software that can cause adverse affects to an infected system, which is exactly what malware is What are the characteristics of a rootkit? Check all that apply. - Is difficult to detect; A rootkit is designed to provide administrator-level access to a third party without the system owner's knowledge. Given this, rootkits are usually designed to avoid detection and can be difficult to detect.

Show more Read less
Institution
IT Security
Course
IT Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
IT Security
Course
IT Security

Document information

Uploaded on
June 21, 2023
Number of pages
5
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
PatrickKaylian Delaware State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1818
Member since
2 year
Number of followers
1043
Documents
22126
Last sold
1 day ago

3.8

316 reviews

5
147
4
60
3
54
2
15
1
40

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions