100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

cob 204 security terms Questions And Answers Rated 100% Correct

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
15-10-2024
Written in
2024/2025

randsomware - ️️malicious software that holds data or a system hostage until an attacker's demands are met virus - ️️malicious software that attaches itself to a legitimate file so that it might infect other systems when that file is shared trojan horse - ️️an executable program that appears to be something useful but is actually harmful worms - ️️malicious software that spreads to other systems on the network without the assistance of humans spyware - ️️malicious software that collects user information typically without the user's knowledge or consent firewall - ️️a device that prevents unauthorized access to a network encryption - ️️the process of transforming plaintext into ciphertext decription - ️️the process of transforming ciphertext into plaintext honeynet - ️️an internal network created for the purpose of attracting an attacker biometrics - ️️an authentication method that relies on "something you are" JMU ID card - ️️authentication relying on "something you have" might use this single sign-on - ️️when a user enters their authentication credentials only once yet gains access to multiple related systems

Show more Read less
Institution
Cob 204 Security Terms
Course
Cob 204 security terms








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cob 204 security terms
Course
Cob 204 security terms

Document information

Uploaded on
October 15, 2024
Number of pages
2
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

cob 204 security terms
randsomware - ✔️✔️malicious software that holds data or a system hostage until an
attacker's demands are met

virus - ✔️✔️malicious software that attaches itself to a legitimate file so that it might
infect other systems when that file is shared

trojan horse - ✔️✔️an executable program that appears to be something useful but is
actually harmful

worms - ✔️✔️malicious software that spreads to other systems on the network without
the assistance of humans

spyware - ✔️✔️malicious software that collects user information typically without the
user's knowledge or consent

firewall - ✔️✔️a device that prevents unauthorized access to a network

encryption - ✔️✔️the process of transforming plaintext into ciphertext

decription - ✔️✔️the process of transforming ciphertext into plaintext

honeynet - ✔️✔️an internal network created for the purpose of attracting an attacker

biometrics - ✔️✔️an authentication method that relies on "something you are"

JMU ID card - ✔️✔️authentication relying on "something you have" might use this

single sign-on - ✔️✔️when a user enters their authentication credentials only once yet
gains access to multiple related systems

asymmetric encryption - ✔️✔️encryption that requires two mathematically related keys

Intrusion Detection System (IDS) - ✔️✔️a system that monitors a network, records user
access, and categorizes attempts as valid or invalid

userpation - ✔️✔️when a computer criminal replaces a legitimate program with an
unauthorized program for malicious purposes

pretexting - ✔️✔️when someones deceives by pretending to be someone else

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Brainarium Delaware State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1831
Member since
2 year
Number of followers
1043
Documents
22327
Last sold
8 hours ago

3.8

317 reviews

5
147
4
60
3
54
2
16
1
40

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions