ISTM 210 Final Exam Questions With 100% Verified Answers 2024
ISTM 210 Final Exam Questions With 100% Verified Answers 2024 Computer Security - answerconcerned w/ risk mgmt, confidentiality, integrity, and availability of the electronic info that is processed and stored w/in a computing system Risk Mgmt - answerrecognition, consequences, and assessment of risk to a comp's assets. Also developing strategies to manage and protect them Hacker/Hacktivist - answersomeone who tries to invade or disable a comp's security measures and then steals comp resources Firewall - answerspecialized hard and software that ensures only authorized personnel and employees w/in a business can use intranet Proxy Server - answerspecial security comp. -allows communication in or out. -protects from external threats Default-deny - answerfirewall rule that only allows network connections that have been permitted Default-allow - answerfirewall rule that allows all traffic unless it's been blocked Computer/Metamorphic Virsues - answerfiles that reproduce by making copies of them w/in a comp's memory, storage, or on a network Malware - answerprograms intended to damage comp system w/out end user knowing Experimental Hardware - answerresearch project to understand how to combat malware Worms - answerlike a virus in a sense that it replicates itself, but can be worse bc doesn't need to attach itself to an existing program to spread -travels through network -can harm by slowing performance, erasing files, damaging physical hardware Trojan Horse - answerseems harmless and even interesting at first until executed -can release any sort of malicious programs -doesn't need user intervention, waits for an action or date Spyware - answercomp program installed to capture or take control of a system w/user knowledge or consent -monitors key strokes -installs new software Adware - answeradvertising supported software. Irritating bc not malicious -from internet w/out user intervention -adware programmers motivated for economic reasons Spamming - answerabuse of email system to send millions of bulk -advertising, chain letters, criminal schemes -faxes, phones, blogs, newsgroups are also prey Denial of Service Attack - answerattempt to make a comp or any of its resources unavailable to intended users -form of malicious program downloaded as email attachment -requires huge amt of processing power -targets larger things like a network, website, software -slow bc extra computing cycles being used up -Estonia Reverse Phishing - answerwhen perpetrator logs onto a comp and installs program that key logs -newer malware -catches sensitive info Malware solutions - answer-anti-virus software. helps identify, prevent, and eliminate comp viruses and malware -back things up 2 Popular Anti-Viruses - answer-Symantec Corp's Norton Antivirus -McAfee's virus scan (Intel) Internet Fraud - answerany fraudulent activity online Internet Fraud can happen through - answer-email systems -message boards
Written for
- Institution
- ISTM 210
- Course
- ISTM 210
Document information
- Uploaded on
- April 15, 2024
- Number of pages
- 12
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
istm 210 final exam questions with 100 verified a
Also available in package deal