100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Terms used in Cyber Security Exam Elaborated Answers

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
23-09-2024
Written in
2024/2025

Instant Message - Answers Common communication using a computer ICMP - Answers Internet Control Message Protocol. Used by a router to exchange information with other routers Configuration Management - Answers The process of keeping track of changes to the system, if needed, approving them. Packet Sniffer - Answers A device or program that monitors the data traveling between computers on a network Gateway - Answers A bridge two networks Keywords - Answers will block any website that to deal with certain predetermined keywords Risk Analysis - Answers The process of identifying security risks, determining their magnitude, and identifying areas needing safeguards Packet Filtering or Packet Purity - Answers analyzed against a set of filters. That make it through the filters are sent to the requesting system and others are discarded Telnet - Answers used to perform commands on a remote computers

Show more Read less
Institution
Cyber Security
Course
Cyber Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Security
Course
Cyber Security

Document information

Uploaded on
September 23, 2024
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Terms used in Cyber Security Exam Elaborated Answers

Instant Message - Answers Common communication using a computer

ICMP - Answers Internet Control Message Protocol. Used by a router to exchange information with
other routers

Configuration Management - Answers The process of keeping track of changes to the system, if needed,
approving them.

Packet Sniffer - Answers A device or program that monitors the data traveling between computers on a
network

Gateway - Answers A bridge two networks

Keywords - Answers will block any website that to deal with certain predetermined keywords

Risk Analysis - Answers The process of identifying security risks, determining their magnitude, and
identifying areas needing safeguards

Packet Filtering or Packet Purity - Answers analyzed against a set of filters. That make it through the
filters are sent to the requesting system and others are discarded

Telnet - Answers used to perform commands on a remote computers

Spyware - Answers any software using someone's Internet connection in the background without their
knowledge or explicit permission. These applications are typically bundled as a hidden component of
freeware or shareware programs that can be downloaded from the Internet; however, it should be
noted that majority of shareware and freeware do not come with this. Once installed, this monitors user
activity on the Internet and transmits that information in the background to someone else. IT can also
gather information about e-mail addresses and even passwords and credit card numbers.

SMTP Session Hijacking - Answers by gaining access to a list of e-mail addresses a person can send spam
to thousands of users

Distributed Tool - Answers A tool that can be distributed to multiple hosts, which can then be
coordinated to anonymously perform an attack on the target host simultaneously after some time delay

Operation Controls - Answers Security methods that focus on mechanisms that primarily are
implemented and executed by people (as opposed to systems)

Encryptions - Answers the translation of data into a secret code; the most effective way to achieve data
security. To read these files, you must have access to a secret key or password that enables you to
decrypt it

, Audit Trail - Answers A record showing who has accessed a computer system and what operations he or
she has performed during a given period of time. Useful both for maintaining security and for recovering
lost transactions

Mobile Code - Answers Software moduels obtained from remote systems, transferred across a network,
and then downloaded and executed on a local system without explicit installation or execution by the
recipient, Malicious types of this are designed, employed, distributed, or activated with the intention of
compromising the performance or security of information systems and computers, increasing access to
those systems disclosing unauthorized information, corrupting information, denying service, or stealing
resources.

Data Integrity - Answers The state that exists when automated data is the same as that in source
documents, or has been correctly computed from source data, and has not been exposed to alteration
or destruction

Digital Signature - Answers A way to verify that an email message is really from the person who
supposedly sent it and that it hasn't been changed. You may have received emails that have a block of
letters and numbers at the bottom of the message - this mathematical algorithm is used to combine the
information in the message. The result is a random-looking string of letters and numbers.

Dictionary Attack - Answers An attack that uses a brute-force technique of successively trying all the
words in some large, exhaustive list

SNMP - Answers Simple Network Management Protocol. Used to collect system information from a
remote computer

EULA - Answers A contract between you and the software's vendor or developer. Some software
packages state that you agree to the contract by removing the shrink-wrap on the package. However,
you may be more familiar with the type of this that is presented as a dialog box that appears the first
time you open the software. It usually requires you to accept the conditions of the contract before you
can proceed

Backup - Answers A copy of data and/or applications contained in the IT stored on magnetic media
outside of the IT to be used in the event IT data are lost.

DNS Spoofing - Answers Assuming the name of another system by either corrupting the name service
cache of a victim system, or by compromising a domain name server for a valid domain

Operating System Bugs - Answers operating systems backdoors

Replicator - Answers Any program that acts to produce copies of itself. Examples include; a program, a
worm, or virus

Firewall - Answers A system designed to prevent unauthorized access to or from a private network; can
be implemented in both hardware and software, or a combination if both; frequently used to prevent

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
336
Member since
1 year
Number of followers
16
Documents
28319
Last sold
6 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions