100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

COB 204 TOM DILLON CHAPTER 10 QUESTIONS ALL ANSWERED CORRECT UPDATED.

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
18-12-2025
Written in
2025/2026

What types of security loss exist? - Answer unauthorized data disclosure, incorrect data modification, faulty service, denial of service, loss of infrastructure unauthorized data disclosure - Answer occurs when a threat obtains data that is supposed to be protected ex: pretexting, phishing, spoofing, sniffing, wardriving, hacking Pretexting - Answer deceiving someone over the internet by pretending to be another person or organization Phishing - Answer technique for obtaining unauthorized data that uses pretexting via email. Phisher - Answer Pretends to be a legitimate company and sends an email requesting confidential data such as account numbers, social security numbers, account passwords and so forth. Spoofing - Answer When someone pretends to be someone else with the intent of obtaining unauthorized data. IP spoofing - Answer occurs when an intruder uses another site's IP address to masquerade as that other site email spoofing - Answer synonym for phishing Sniffing - Answer technique for intercepting computer communications Wardrivers - Answer take computers with wireless connections through an area and search for unprotected wireless networks. Use packet sniffers. packet sniffers - Answer programs that capture network traffic to monitor and intercept traffic on unsecured wireless (or wired) networks Hacking - Answer breaking into computers, servers, or networks to steal data

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
December 18, 2025
Number of pages
6
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

COB 204 TOM DILLON CHAPTER 10
QUESTIONS ALL ANSWERED
CORRECT 2025-2026 UPDATED.
What types of security loss exist? - Answer unauthorized data disclosure, incorrect data
modification, faulty service, denial of service, loss of infrastructure



unauthorized data disclosure - Answer occurs when a threat obtains data that is supposed to
be protected

ex: pretexting, phishing, spoofing, sniffing, wardriving, hacking



Pretexting - Answer deceiving someone over the internet by pretending to be another
person or organization



Phishing - Answer technique for obtaining unauthorized data that uses pretexting via email.



Phisher - Answer Pretends to be a legitimate company and sends an email requesting
confidential data such as account numbers, social security numbers, account passwords and so
forth.



Spoofing - Answer When someone pretends to be someone else with the intent of obtaining
unauthorized data.



IP spoofing - Answer occurs when an intruder uses another site's IP address to masquerade
as that other site



email spoofing - Answer synonym for phishing



Sniffing - Answer technique for intercepting computer communications



Wardrivers - Answer take computers with wireless connections through an area and search
for unprotected wireless networks. Use packet sniffers.

, incorrect data modification - Answer can occur through human error when employees follow
procedures incorrectly or when procedures have been designed incorrectly

ex: system errors



faulty service - Answer includes problems that result because of incorrect system operation

ex: usurpation



usurpation - Answer Occurs when unauthorized programs invade a computer system and
replace legitimate programs.



Denial of Service - Answer Security problem in which users are not able to access an
information system; can be caused by human errors, natural disaster, or malicious activity.



Loss of Infrastructure - Answer Human accidents

Theft and terrorist events

Disgruntled or terminated employee

Natural disasters

ex: advances persistent threat



Advanced Persistent Threat (APT) - Answer a sophisticated, possibly long-running computer
hack that is perpetrated by large, well-funded organizations such as governments



the goal of information security is to - Answer find an appropriate trade-off between the risk
of loss and the cost of implementing safeguards



components of a cyber security model - Answer 1. Assets/Targets

2. Threats

3. Vulnerabilities

4. Safeguards/Controls



Assets/Targets - Answer resource or information that need to be protected

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TestSolver9 Webster University
View profile
Follow You need to be logged in order to follow users or courses
Sold
751
Member since
2 year
Number of followers
124
Documents
24581
Last sold
6 days ago
TESTSOLVER9 STORE

TOPNOTCH IN LEARNING MATERIALS,(EXAMS,STUDYGUIDES NOTES ,REVIEWS,FLASHCARDS ,ALL SOLVED AND PACKAGED.OUR STORE MAKE YOUR EDUCATION JOURNEY EFFICIENT AND EASY.WE ARE HERE FOR YOU FEEL FREE TO REACH US OUT .

3.6

130 reviews

5
58
4
19
3
22
2
9
1
22

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions