Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

ISTM 210 Test Questions with Correct Answers

Puntuación
-
Vendido
-
Páginas
4
Grado
A+
Subido en
01-06-2024
Escrito en
2023/2024

ISTM 210 Test Questions with Correct Answers Computer Security is concerned with 3 things: - Answer-1. Risk Mgmt 2.Integrity of electronic Information 3. Privacy Risk Management - Answer-includes the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them. Hacker/Hacktivist - Answer-Someone who attempts to invade or disable a computer's security measures and then to steal the computer resources at their leisure. unsecured computer - Answer-extremely easy to breach, especially by a seasoned hacker firewalls - Answer-- entails specialized hardware and software working together that ensures that only authorized personnel and employees within a business can use its Intranet. - keep unauthorized Internet users out of private intranets Proxy Server - Answer-Any communications in or out of an intranet pass through a special security computer called a proxy server as a precaution to protect from any external threats. "default-deny" firewall - Answer-rule set in that the only network connections that are permitted are the ones that have been explicitly allowed "default-allow" - Answer-rule set in that all traffic is allowed unless it has been specifically blocked. This configuration makes inadvertent network connections and system compromise much more likely. Computer Viruses - Answer-The term "virus" comes from biology. Computer viruses are computer files that reproduce by making copies of them within a computer's memory, storage, or on a network. Metamorphic Viruses - Answer-act in similar ways to biological viruses. Unlike biological viruses, computer viruses do not evolve on their own. Malware - Answer-includes programs specifically intended to penetrate or damage a computer system without the end user's knowledge. Experimental malware - Answer-have been written as a research project to further understand how to combat them, while others are pranks and vandalism. Worms - Answer-A computer worm is like a virus in that it is self-replicating but can be potentially more insidious in that it does not need to attach itself to an existing program to spread. Trojan horses - Answer-The term Trojan horse originates from the myth of the Trojan War and the enormous wooden horse used by the Greeks to sneak hundreds of warriors into the city of Troy. In a computing context, a Trojan horse typically describes a program that often seems harmless and possibly interesting at first until it is executed. When the program is executed, it may release one or many harmful viruses, worms, or any other sort of malicious programs into a computer or networked system. Spyware - Answer-Spyware is described as a computer program that is installed covertly on a computer to capture or take control of the system without the user's knowledge or consent. Adware - Answer-Adware or advertising-supported software is typically more irritating to a user as it is not usually as malicious. Spamming - Answer-Spam or junk email is the abuse of an email system to arbitrarily send millions of unsolicited bulk messages. Denial-of-service attack - Answer-A Denial-of-service (DoS for short) is an attempt to make a computer or any of its resources unavailable to its intended users. Reverse Phishing / Keylogging - Answer-A relatively newer form of malware, keylogging describes when a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard. The computer criminal waits for a legitimate user to sign in, and then the keylogging software records the login ID, password, and any other sensitive information. Antivirus software - Answer-includes computer programs that attempt to identify, prevent and eliminate computer viruses and malware, typically before they reach a computing system or network. Symantec Corporation's Norton AntiVirus and McAfee's VirusScan - Answer-Two popular antivirus programs that are constantly updated with the latest downloads to ward off the newest viruses. HTML (Hypertext Markup Language) - Answer-is the principal programming language resolved and rendered by browsers to display Web pages. link element - Answer-create elements that can become hyperlinks that allow web page users to navigate to different parts of a web site, or differentparts of the World Wide Web. The following is an example of a link element: a href=""McCarthy CustomHomes/a

Mostrar más Leer menos
Institución
ISTM 210
Grado
ISTM 210








Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
ISTM 210
Grado
ISTM 210

Información del documento

Subido en
1 de junio de 2024
Número de páginas
4
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$13.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
shiifridoc EXAMS
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
9
Miembro desde
2 año
Número de seguidores
7
Documentos
1905
Última venta
3 meses hace
Best Study Guide Exams Questions and Answers

Assisting students with quality work is my number one priority. My documents are 100% guaranteed to help you Ace in your career path, I can assure a good grade if you use my work.

5.0

3 reseñas

5
3
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes