100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cybersecurity - PLTW EoC Exam Questions And Answers With Latest Updates

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
03-06-2024
Written in
2023/2024

malware - software spread by people through website, email and messages. o Viruses infect your computer and cause problems worm - unlike a virus, a worm does not need a human to spread. o It will replicate on its own to infect other computers backdoor - malicious software that gets passed normally restricted access. spyware - software that secretly collect information about you. o Sits on websites or other services such as emails trojan horse - malicious program disguised as legitimate software o Users may download it accidentally thinking it was an actual software .bat - Batch File -> Open a Batch file script .vbs - VPScript (Virtual Basic Script) -> Open VBScript .hta - HTML -> Open a Program * - used to find any word or file name. datemodified:today and datemodified[date] - used to find files that are modified on that specific date. kind:= - used to find a file in a specific :=folder - used to find a file in any folder. *SEC kind:=folder - used to find SEC in any file name in any folder. kind=* - used to find any kind of file. datemodified:* - used to find a file form any date. Using ______, you can exclude things in your search? - NOT CIA Triad stands for... - Confidentiality Integrity Availability Confidentiality in the CIA Triad means... - o Government Secrets o Access codes to critical systems o Financial information such as bank account and credit card numbers Integrity in the CIA Triad means... - o Air traffic control data o Hospital data such as prescription doses and surgery schedules Availability in the CIA Triad means... - o Movie times o Shopping sites o Search engines and results disconnect - an add-on that prevents extra websites not related to the original website from the popping uppassive analysis - searching through a websites details without affecting their systems. AWS - secure cloud service that is an expansion of different services and serves many functions. Cloud9 - a way for us to access data without hurting your computer. Whois - shows when it was created and by whom, shows info about URL. sudo yum install - install code system. Nslookup - allows user to find domain names URLs and IP addresses. Traceroute - shows the path a network, server and domain goes. -d - omits domain name translation. Netstat - converts IP addresses to domain names. -n - numeric IP addresses. Botnet - software that replicates and infects many computers, turning the computer into a "zombie". o Zombie devices are remotely controlled by an attacker for malicious purposes. Keylogger - software/hardware that tracks what key's are pressed to gain info from the user. Man in the Middle - human based attack where a user finds communication between the computer and the internet.Ransomware - software locks computer to where the user must pay to remove it. Rootkit - software with elevated privileges to control a computer/gain restricted accounts and data. Programming Error - bugs/problems in the program that allow attackers to access the computer. Ping Flood - attacker overwhelms user with packets. Ping of Death - sends malicious ping to a computer. Smurf Attack - send packets to exploit broadcast networks. Mailbomb - attempting to overflow a mailbox. Teardrop - sending fragments of packets to one computer. MAC Addresses - permanent identifier of a network device. o used to know where send things Hexadecimal - base-16 number system (0-9 & A-F) NIC - network interface card, a physical component on a computer or device that provides connectivity to a network. IEEE - Institute of Electrical Electronic Engineers - known for developing standards in the computer and electronics industries.TCP Handshake - a 3-way communication method using... o SYN (synchronize) o SYN-ACK (synchronize = acknowledge) o ACK (acknowledge) to establish a connection between hosts

Show more Read less
Institution
Cybersecurity - PLTW EoC
Course
Cybersecurity - PLTW EoC









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cybersecurity - PLTW EoC
Course
Cybersecurity - PLTW EoC

Document information

Uploaded on
June 3, 2024
Number of pages
8
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
PatrickKaylian Delaware State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1806
Member since
2 year
Number of followers
1043
Documents
22113
Last sold
8 hours ago

3.8

316 reviews

5
147
4
60
3
54
2
15
1
40

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions