ISTM 210 Final Exam Questions With 100% Verified Answers 2024
ISTM 210 Final Exam Questions With 100% Verified Answers 2024 Computer Security - answerconcerned w/ risk mgmt, confidentiality, integrity, and availability of the electronic info that is processed and stored w/in a computing system Risk Mgmt - answerrecognition, consequences, and assessment of risk to a comp's assets. Also developing strategies to manage and protect them Hacker/Hacktivist - answersomeone who tries to invade or disable a comp's security measures and then steals comp resources Firewall - answerspecialized hard and software that ensures only authorized personnel and employees w/in a business can use intranet Proxy Server - answerspecial security comp. -allows communication in or out. -protects from external threats Default-deny - answerfirewall rule that only allows network connections that have been permitted Default-allow - answerfirewall rule that allows all traffic unless it's been blocked Computer/Metamorphic Virsues - answerfiles that reproduce by making copies of them w/in a comp's memory, storage, or on a network Malware - answerprograms intended to damage comp system w/out end user knowing Experimental Hardware - answerresearch project to understand how to combat malware Worms - answerlike a virus in a sense that it replicates itself, but can be worse bc doesn't need to attach itself to an existing program to spread -travels through network -can harm by slowing performance, erasing files, damaging physical hardware Trojan Horse - answerseems harmless and even interesting at first until executed -can release any sort of malicious programs -doesn't need user intervention, waits for an action or date Spyware - answercomp program installed to capture or take control of a system w/user knowledge or consent -monitors key strokes -installs new software Adware - answeradvertising supported software. Irritating bc not malicious -from internet w/out user intervention -adware programmers motivated for economic reasons Spamming - answerabuse of email system to send millions of bulk -advertising, chain letters, criminal schemes -faxes, phones, blogs, newsgroups are also prey Denial of Service Attack - answerattempt to make a comp or any of its resources unavailable to intended users -form of malicious program downloaded as email attachment -requires huge amt of processing power -targets larger things like a network, website, software -slow bc extra computing cycles being used up -Estonia Reverse Phishing - answerwhen perpetrator logs onto a comp and installs program that key logs -newer malware -catches sensitive info Malware solutions - answer-anti-virus software. helps identify, prevent, and eliminate comp viruses and malware -back things up 2 Popular Anti-Viruses - answer-Symantec Corp's Norton Antivirus -McAfee's virus scan (Intel) Internet Fraud - answerany fraudulent activity online Internet Fraud can happen through - answer-email systems -message boards -chat rooms -websites Click Fraud - answerEverytime someone clicks on an ad, they get money -Ex. google adsense Purchase Scams - answerInvolve a buyer that approaches merchants via spam and asks to pay for their shipping with credit card -most uncomplicated type of internet fraud Phishing - answercriminal activity involving social engineer techniques to gain private info -paypal and ebay are common target Advantage of Cookies - answer-don't have to retype info -experience is easier Disadvantage of Cookies - answer-used for tracking website behavior -owner of website knows your browsing habits History Files - answerlist of stored or cached websites on a user's comp that are an account of where and what a user's web browser has visited Identity Theft - answercrime concerning unlawful practice of assuming another's identity for economic gain -just need SSN Shoulder Surfing - answercriminal in public place that looks over victim's shoulder to watch them type sensitive info -ex. typing pin # at ATM Dumpster Diving - answerthrown out and not shredded SCAM - answer-Stingy about giving out sensitive info -Check financial info on regular basis and inspect for anything odd -Ask periodically for credit report -Maintain records of banking and financing CAN-SPAM - answerrules made for people when sending spam mail Sting Ray - answeracts like a cell tower and intercepts phone calls
Written for
- Institution
- ISTM 210
- Course
- ISTM 210
Document information
- Uploaded on
- April 3, 2024
- Number of pages
- 12
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
istm 210 final exam questions with 100 verified a
Also available in package deal