ISTM 210 Test Questions with Correct Answers
ISTM 210 Test Questions with Correct Answers Computer Security is concerned with 3 things: - Answer-1. Risk Mgmt 2.Integrity of electronic Information 3. Privacy Risk Management - Answer-includes the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them. Hacker/Hacktivist - Answer-Someone who attempts to invade or disable a computer's security measures and then to steal the computer resources at their leisure. unsecured computer - Answer-extremely easy to breach, especially by a seasoned hacker firewalls - Answer-- entails specialized hardware and software working together that ensures that only authorized personnel and employees within a business can use its Intranet. - keep unauthorized Internet users out of private intranets Proxy Server - Answer-Any communications in or out of an intranet pass through a special security computer called a proxy server as a precaution to protect from any external threats. "default-deny" firewall - Answer-rule set in that the only network connections that are permitted are the ones that have been explicitly allowed "default-allow" - Answer-rule set in that all traffic is allowed unless it has been specifically blocked. This configuration makes inadvertent network connections and system compromise much more likely. Computer Viruses - Answer-The term "virus" comes from biology. Computer viruses are computer files that reproduce by making copies of them within a computer's memory, storage, or on a network. Metamorphic Viruses - Answer-act in similar ways to biological viruses. Unlike biological viruses, computer viruses do not evolve on their own. Malware - Answer-includes programs specifically intended to penetrate or damage a computer system without the end user's knowledge. Experimental malware - Answer-have been written as a research project to further understand how to combat them, while others are pranks and vandalism. Worms - Answer-A computer worm is like a virus in that it is self-replicating but can be potentially more insidious in that it does not need to attach itself to an existing program to spread. Trojan horses - Answer-The term Trojan horse originates from the myth of the Trojan War and the enormous wooden horse used by the Greeks to sneak hundreds of warriors into the city of Troy. In a computing context, a Trojan horse typically describes a program that often seems harmless and possibly interesting at first until it is executed. When the program is executed, it may release one or many harmful viruses, worms, or any other sort of malicious programs into a computer or networked system. Spyware - Answer-Spyware is described as a computer program that is installed covertly on a computer to capture or take control of the system without the user's knowledge or consent. Adware - Answer-Adware or advertising-supported software is typically more irritating to a user as it is not usually as malicious. Spamming - Answer-Spam or junk email is the abuse of an email system to arbitrarily send millions of unsolicited bulk messages. Denial-of-service attack - Answer-A Denial-of-service (DoS for short) is an attempt to make a computer or any of its resources unavailable to its intended users. Reverse Phishing / Keylogging - Answer-A relatively newer form of malware, keylogging describes when a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard. The computer criminal waits for a legitimate user to sign in, and then the keylogging software records the login ID, password, and any other sensitive information. Antivirus software - Answer-includes computer programs that attempt to identify, prevent and eliminate computer viruses and malware, typically before they reach a computing system or network. Symantec Corporation's Norton AntiVirus and McAfee's VirusScan - Answer-Two popular antivirus programs that are constantly updated with the latest downloads to ward off the newest viruses. HTML (Hypertext Markup Language) - Answer-is the principal programming language resolved and rendered by browsers to display Web pages. link element - Answer-create elements that can become hyperlinks that allow web page users to navigate to different parts of a web site, or differentparts of the World Wide Web. The following is an example of a link element: a href=""McCarthy CustomHomes/a
Escuela, estudio y materia
- Institución
- ISTM 210
- Grado
- ISTM 210
Información del documento
- Subido en
- 1 de junio de 2024
- Número de páginas
- 4
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
istm 210
-
istm 210 test questions
-
istm 210 test questions with correct answers