100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ISTM 210 Exam 2 Latest 2024 Complete 170 Actual Exam Questions with 100% Correct Verified Answers/ Graded A+

Rating
-
Sold
-
Pages
19
Grade
9-10
Uploaded on
01-01-2025
Written in
2024/2025

ISTM 210 Exam 2 Latest 2024 Complete 170 Actual Exam Questions with 100% Correct Verified Answers/ Graded A+

Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
January 1, 2025
Number of pages
19
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISTM 210 Exam 2 Latest 2024 Complete 170 Actual Exam Questions
with 100% Correct Verified Answers/ Graded A+

1. Computer Security concerned with risk management, confiden-
tiality, integrity, and the availability of the
electronic information that is processed and
stored within a computing system

2. risk management includes the recognition, consequences, and
assessment of risk to a computer's assets,
and developing strategies to manage and pro-
tect them

3. hacker also known as hacktivist, is somebody who
attempts to invade of disable a computer's
security measures and then to steal the com-
puter resources at their leisure

4. unsecured computer computer that is extremely easy to breach,
especially by a seasoned hacker

5. the key aspect of an intranet privacy
is ______

6. firewall entails specialized hardware and software
working together that only authorized person-
nel and employees within a business can use
its intranet

7. ________ keep unautho- firewalls
rized users out of private in-
tranets

8. any communications in or proxy server
out of an intranet pass
through a special secu-
rity computer called a
______________ as a pre-
caution to protect from any
external threats

9. port used to contain and delay structural fire from
spreading to contiguous buildings


, ISTM 210 Exam 2 Latest 2024


10. standard security practices default-deny
dictate a __________ fire-
wall rule set in that the
only network connections
that are permitted are the
ones that have been explic-
itly allowed

11. default-allow rule set in that all traffic is allowed unless it
has been specifically blocked

12. computer viruses computer files that reproduce by making
copies of them within a computer's memory,
storage, or on a network

13. metamorphic virus Are viruses can alter how the appear and
known to avoid detection.

14. malware programs specifically intended to penetrate or
damage a computer system without the end
user's knowledge

15. experimental malware written as research project to further under-
stand how to combat them

16. worms self-replicating but can be potentially more
insidious in that is does not need to attach
itself to an existing program to spread

17. Trojan horses program that often seems harmless and inter-
esting at fist until it is executed

18. spyware program that is installed covertly on a com-
puter to capture or take control of the system
without the user's knowledge or consent

19. adware also called advertising-supported software,
programs that automatically display or down-
load advertising to a computer


, ISTM 210 Exam 2 Latest 2024

20. spamming also called junk email, abuse of an email sys-
tem to arbitrarily send millions of on solicited
bulk messages

21. denial of service attack DoS for short, attempt to make a a computer
or any of its resources unavailable to its in-
tended users

22. reverse phishing/keylog- when a perpetrator logs onto a computer
ging workstation and installs a program that simply
records every keystroke made at the worksta-
tion's keyboard

23. antivirus software computer programs that attempt to identify,
prevent, and eliminate computer viruses and
malware

24. two popular antivirus pro- Symantec Corporation's Norton Antivirus and
grams are McAfee's VirusScan

25. system patches updates sent out to fix security threats in the
operating system

26. strong passwords longer in length than ordinary passwords, typ-
ically 8-12 characters

27. passphrase memorable strong password

28. internet fraud refers to any fraudulent activity in an online
setting; can occur through email systems,
message boards, chat rooms, or websites

29. click fraud manipulating the number of times an ad is
clicked on to inflate advertising bills

30. purchase scams involve a buyer typically in another country
that approaches merchants via spam and
asks if they can pay for shipping with a credit
card
$15.18
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
TestPrepPros

Also available in package deal

Get to know the seller

Seller avatar
TestPrepPros Universiteit van Amsterdam
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
11 months
Number of followers
0
Documents
80
Last sold
-

BUY WITHOUT DOUBT AND PASS YOUR EXAMS WITH EXCELLENT GRADES!!!

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions