100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

INSY 3330 Exam 2 Exam Questions and Answers 100% Pass |Verified & Updated|ACTUAL 2025/2026 Cheat Sheet

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
20-10-2025
Written in
2025/2026

INSY 3330 Exam 2 Exam Questions and Answers 100% Pass |Verified & Updated|ACTUAL 2025/2026 Cheat Sheet

Institution
ACSM CPT
Course
ACSM CPT









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ACSM CPT
Course
ACSM CPT

Document information

Uploaded on
October 20, 2025
Number of pages
5
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

INSY 3330 Exam 2
Study online at https://quizlet.com/_hq9e23

1. Worm malware that is designed to spread from computer to computer

2. Trojan horse appears to be benign, but then does something other than expected; a way for
viruses or malicious code to be introduced to a computer system

3. Phishing attack online attempt by a third party to obtain confidential information for financial gain

4. Spoofing involves attempting to hide a true identity by using someone else's email or IP
address

5. TLS (Transport provides data encryption, server authentication, optional client authentication, and
Layer Security) message integrity

6. Digital cash an alternative payment system in which unique, authenticated tokens represent
cash value

7. Cyber crime criminal activity that takes place over the Internet

8. Botnet a collection of captured bot computers; respond to commands sent by an external
attacker

9. Spyware a program used to obtain information such as a user's keystrokes, email, IM's, and
so on

10. Symmetric key both the sender and receiver use the same key to encrypt and decrypt the message
encryption

11. Public key en- two mathematically related digital keys are used (public + private keys); the private
cryption key is kept secret by the owner, and the public key is widely disseminated
- the same key cannot be used to decrypt and unencrypt a given message

12. Firewall refers to either hardware or software that filters communication packets and
prevents some packets from entering the network based on a security policy

13. Proxy server
1/5

, INSY 3330 Exam 2
Study online at https://quizlet.com/_hq9e23

software server that handles all communications originating from or being sent to
the Internet; acts as a spokesperson or bodyguard for an organization

14. Intrusion detec- examines network traffic, watching to see if it matches certain patterns or precon-
tion figured rules indicative of an attack

15. Access control determine who can gain legitimate access to a network

16. 6 Dimensions of integrity, nonrepudiation, authenticity, confidentiality, privacy, and availability
E-Commerce Se-
curity

17. Integrity the ability to ensure that information being displayed on a Web site or transmitted
over the Internet has not been altered in any by an unauthorized party

18. Nonrepudiation the ability to ensure that e-commerce participants do not deny their online actions

19. Authenticity the ability to identify the identity of a person or entity with whom you are dealing
on the Internet

20. Confidentiality the ability to ensure that messages and data are available only to those who are
authorized to use them

21. Privacy the ability to control the use of information a customer provides to an e-commerce
merchant

22. Availability the ability to ensure that an e-commerce site continues to function as intended

23. Transaction log records user activity at a Web site

24. Cookie small text file that stores data that allows a Web site to store data on a user's
computer and later retrieve it; tracks users as they travel across the Web

25. Digital divide inequality in access to and usage of the Internet by different demographic groups

2/5

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BrittieDonald Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
400
Member since
2 year
Number of followers
162
Documents
20443
Last sold
3 days ago
BrittieDonald Study Solutions.

Get Help in Your Due Online and Actual Exams, Assignments with Well Researched and Up-to date Study Materials for Guaranteed Success

3.5

90 reviews

5
41
4
13
3
7
2
5
1
24

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions