100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

UARK ISYS 2103 - Exam 2 Test Questions with Correct Detailed Answers Edition.

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
13-10-2025
Written in
2025/2026

Computer Fraud - Answer unauthorized use of computer data for personal gain such as transferring money from another's account or charging purchases to someone else's account Spyware - Answer software that secretly gathers information about users while they browse the Web Adware - Answer form of spyware that collects information about the user to display advertisements in the Web browser Phishing - Answer sending fraudulent e-mails that seem to come from legitimate sources -spear phishing = targeted phishing Pharming - Answer trick users to visit fraudulent web sites and provide private information -real web sites can be hijacked Keystroke Loggers - Answer -monitor and record keystrokes -can be software or hardware devices sometimes used by companies to track employees' use of e-mail and the Internet -can be used for malicious purposes Sniffing - Answer capturing and recording network traffic often used by hackers to intercept information Spoofing - Answer attempt to gain access to a network by posing as an authorized user to find sensitive information Ransomware - Answer stealing data and demand money for return or encrypt data and demand money for key Why is security critical for any organization? - Answer (especially in recent years) with hackers becoming more numerous and adept at stealing and altering private information

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
October 13, 2025
Number of pages
14
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

UARK ISYS 2103 - Exam 2 Test
Questions with Correct Detailed
Answers 2025-2026 Edition.
Computer Fraud - Answer unauthorized use of computer data for personal gain such as
transferring money from another's account or charging purchases to someone else's account



Spyware - Answer software that secretly gathers information about users while they browse
the Web



Adware - Answer form of spyware that collects information about the user to display
advertisements in the Web browser



Phishing - Answer sending fraudulent e-mails that seem to come from legitimate sources

-spear phishing = targeted phishing



Pharming - Answer trick users to visit fraudulent web sites and provide private information

-real web sites can be hijacked



Keystroke Loggers - Answer -monitor and record keystrokes

-can be software or hardware devices sometimes used by companies to track employees' use of
e-mail and the Internet

-can be used for malicious purposes



Sniffing - Answer capturing and recording network traffic often used by hackers to intercept
information



Spoofing - Answer attempt to gain access to a network by posing as an authorized user to find
sensitive information



Ransomware - Answer stealing data and demand money for return

or encrypt data and demand money for key

, Black Hats - Answer specialized hackers, for profit, fun, political causes, social causes;
modify/destroy data



White Hats - Answer aka "Ethical Hackers", pentetration testers



What kind of tools do hackers use to break into computers and networks? - Answer -Sniffers,
password crackers, and rootkits

-Journals Phrack and 2600: The Hacker Quarterly

-dark web - untraceable web within the web; easy to hide illegal activity



Comprehensive Security System - Answer Protects an organization's resources (information
and computer and network equipment, e-mails, invoices transferred via electronic data
interchange (EDI), new product designs, marketing campaigns, and financial statements, etc.)



Security (CIA) - Answer -confidentiality

-integrity

-availability



Confidentiality - Answer system must not allow disclosing information to anyone who isn't
authorized to access it



Integrity - Answer ensures the accuracy of information resources in an organization



Availability - Answer ensures that computers and networks are operating and authorized users
can access the information they need



3 Levels of Security - Answer -Level 1 - front end servers

-Level 2 - back end servers

-Level 3 - corporate network



Fault-Tolerant System - Answer ensure availability in the event of a system failure by using a
combination of hardware and software

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
COCOSOLUTIONS Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
139
Member since
1 year
Number of followers
16
Documents
6592
Last sold
4 days ago
COCO SOLUTIONS ACADEMIC STORE

COCO SOLUTIONS ACADEMIC STORE YOU GET ALL KIND OF EXAMS,STUDYGUIDES,ASSIGNMENTS,FLASHCARDS,NOTES,SUMMARIES,REVIEWS .ALL YOUR ACADEMIC SOLUTIONS WE GOT YOU COVERED.WE ARE YOUR STUDY SOLUTION ,MAKING YOUR EDUCATION JOURNEY SMOOTH AND EFFICIENT FOR MORE ENQUIRIES FEEL FREE TO REACH US OUT.

4.2

23 reviews

5
13
4
4
3
4
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions