Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4.2 TrustPilot
logo-home
Examen

ISTM 210 Final Exam Questions With 100% Verified Answers 2024

Note
-
Vendu
-
Pages
12
Grade
A+
Publié le
03-04-2024
Écrit en
2023/2024

ISTM 210 Final Exam Questions With 100% Verified Answers 2024 Computer Security - answerconcerned w/ risk mgmt, confidentiality, integrity, and availability of the electronic info that is processed and stored w/in a computing system Risk Mgmt - answerrecognition, consequences, and assessment of risk to a comp's assets. Also developing strategies to manage and protect them Hacker/Hacktivist - answersomeone who tries to invade or disable a comp's security measures and then steals comp resources Firewall - answerspecialized hard and software that ensures only authorized personnel and employees w/in a business can use intranet Proxy Server - answerspecial security comp. -allows communication in or out. -protects from external threats Default-deny - answerfirewall rule that only allows network connections that have been permitted Default-allow - answerfirewall rule that allows all traffic unless it's been blocked Computer/Metamorphic Virsues - answerfiles that reproduce by making copies of them w/in a comp's memory, storage, or on a network Malware - answerprograms intended to damage comp system w/out end user knowing Experimental Hardware - answerresearch project to understand how to combat malware Worms - answerlike a virus in a sense that it replicates itself, but can be worse bc doesn't need to attach itself to an existing program to spread -travels through network -can harm by slowing performance, erasing files, damaging physical hardware Trojan Horse - answerseems harmless and even interesting at first until executed -can release any sort of malicious programs -doesn't need user intervention, waits for an action or date Spyware - answercomp program installed to capture or take control of a system w/user knowledge or consent -monitors key strokes -installs new software Adware - answeradvertising supported software. Irritating bc not malicious -from internet w/out user intervention -adware programmers motivated for economic reasons Spamming - answerabuse of email system to send millions of bulk -advertising, chain letters, criminal schemes -faxes, phones, blogs, newsgroups are also prey Denial of Service Attack - answerattempt to make a comp or any of its resources unavailable to intended users -form of malicious program downloaded as email attachment -requires huge amt of processing power -targets larger things like a network, website, software -slow bc extra computing cycles being used up -Estonia Reverse Phishing - answerwhen perpetrator logs onto a comp and installs program that key logs -newer malware -catches sensitive info Malware solutions - answer-anti-virus software. helps identify, prevent, and eliminate comp viruses and malware -back things up 2 Popular Anti-Viruses - answer-Symantec Corp's Norton Antivirus -McAfee's virus scan (Intel) Internet Fraud - answerany fraudulent activity online Internet Fraud can happen through - answer-email systems -message boards -chat rooms -websites Click Fraud - answerEverytime someone clicks on an ad, they get money -Ex. google adsense Purchase Scams - answerInvolve a buyer that approaches merchants via spam and asks to pay for their shipping with credit card -most uncomplicated type of internet fraud Phishing - answercriminal activity involving social engineer techniques to gain private info -paypal and ebay are common target Advantage of Cookies - answer-don't have to retype info -experience is easier Disadvantage of Cookies - answer-used for tracking website behavior -owner of website knows your browsing habits History Files - answerlist of stored or cached websites on a user's comp that are an account of where and what a user's web browser has visited Identity Theft - answercrime concerning unlawful practice of assuming another's identity for economic gain -just need SSN Shoulder Surfing - answercriminal in public place that looks over victim's shoulder to watch them type sensitive info -ex. typing pin # at ATM Dumpster Diving - answerthrown out and not shredded SCAM - answer-Stingy about giving out sensitive info -Check financial info on regular basis and inspect for anything odd -Ask periodically for credit report -Maintain records of banking and financing CAN-SPAM - answerrules made for people when sending spam mail Sting Ray - answeracts like a cell tower and intercepts phone calls

Montrer plus Lire moins
Établissement
ISTM 210
Cours
ISTM 210









Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
ISTM 210
Cours
ISTM 210

Infos sur le Document

Publié le
3 avril 2024
Nombre de pages
12
Écrit en
2023/2024
Type
Examen
Contient
Questions et réponses

Sujets

€11,49
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien


Document également disponible en groupe

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
TheStar Florida State University
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
607
Membre depuis
2 année
Nombre de followers
178
Documents
24049
Dernière vente
11 heures de cela
Stuvia Prodigy

Tested, Verified and Updated Study Materials with 100% Guaranteed Success.

3,8

121 revues

5
58
4
21
3
21
2
4
1
17

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions