100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CGS2060 Computer Security UPDATED ACTUAL Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
3
Grade
A+
Uploaded on
30-01-2025
Written in
2024/2025

CGS2060 Computer Security UPDATED ACTUAL Exam Questions and CORRECT Answers The malicious use of a computer code to modify the normal operations of a computer or network is called a _____. - CORRECT ANSWER - Cyberattack An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ____ attack. - CORRECT ANSWER - DDoS

Show more Read less
Institution
CGS2060
Course
CGS2060








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CGS2060
Course
CGS2060

Document information

Uploaded on
January 30, 2025
Number of pages
3
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CGS2060 Computer Security UPDATED
ACTUAL Exam Questions and CORRECT
Answers
The malicious use of a computer code to modify the normal operations of a computer or network
is called a _____. - CORRECT ANSWER - Cyberattack


An attack on a network that is designed to interrupt or stop network traffic by flooding it with too
many requests is called a ____ attack. - CORRECT ANSWER - DDoS


Specialized hardware or software that capture packets transmitted over a network are called
packet _____. - CORRECT ANSWER - Sniffers



An unsolicited email message is called ____. - CORRECT ANSWER - Spam


Firewall software used to block a user's access to specific Internet content is called a(n) _____
filter. - CORRECT ANSWER - Internet


A person who uses computers and the Internet to launch attacks against computer systems for
political or ideological reasons is called a ____. - CORRECT ANSWER - Cyberterrorist


A type of phishing that seeks to obtain personal information through malicious software that is
inserted on a victim's computer is called _____. - CORRECT ANSWER - Pharming



What does DDoS stand for? - CORRECT ANSWER - Distributed Denial of Service


A person who gains unauthorized access to networks in order to steal and corrupt information
and data is called a _____. - CORRECT ANSWER - Hacker

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1063
Member since
1 year
Number of followers
102
Documents
68976
Last sold
5 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

168 reviews

5
73
4
30
3
43
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions