100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

Cybersecurity - PLTW EoC Exam Questions And Answers With Latest Updates

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A+
Geüpload op
03-06-2024
Geschreven in
2023/2024

malware - software spread by people through website, email and messages. o Viruses infect your computer and cause problems worm - unlike a virus, a worm does not need a human to spread. o It will replicate on its own to infect other computers backdoor - malicious software that gets passed normally restricted access. spyware - software that secretly collect information about you. o Sits on websites or other services such as emails trojan horse - malicious program disguised as legitimate software o Users may download it accidentally thinking it was an actual software .bat - Batch File -> Open a Batch file script .vbs - VPScript (Virtual Basic Script) -> Open VBScript .hta - HTML -> Open a Program * - used to find any word or file name. datemodified:today and datemodified[date] - used to find files that are modified on that specific date. kind:= - used to find a file in a specific :=folder - used to find a file in any folder. *SEC kind:=folder - used to find SEC in any file name in any folder. kind=* - used to find any kind of file. datemodified:* - used to find a file form any date. Using ______, you can exclude things in your search? - NOT CIA Triad stands for... - Confidentiality Integrity Availability Confidentiality in the CIA Triad means... - o Government Secrets o Access codes to critical systems o Financial information such as bank account and credit card numbers Integrity in the CIA Triad means... - o Air traffic control data o Hospital data such as prescription doses and surgery schedules Availability in the CIA Triad means... - o Movie times o Shopping sites o Search engines and results disconnect - an add-on that prevents extra websites not related to the original website from the popping uppassive analysis - searching through a websites details without affecting their systems. AWS - secure cloud service that is an expansion of different services and serves many functions. Cloud9 - a way for us to access data without hurting your computer. Whois - shows when it was created and by whom, shows info about URL. sudo yum install - install code system. Nslookup - allows user to find domain names URLs and IP addresses. Traceroute - shows the path a network, server and domain goes. -d - omits domain name translation. Netstat - converts IP addresses to domain names. -n - numeric IP addresses. Botnet - software that replicates and infects many computers, turning the computer into a "zombie". o Zombie devices are remotely controlled by an attacker for malicious purposes. Keylogger - software/hardware that tracks what key's are pressed to gain info from the user. Man in the Middle - human based attack where a user finds communication between the computer and the internet.Ransomware - software locks computer to where the user must pay to remove it. Rootkit - software with elevated privileges to control a computer/gain restricted accounts and data. Programming Error - bugs/problems in the program that allow attackers to access the computer. Ping Flood - attacker overwhelms user with packets. Ping of Death - sends malicious ping to a computer. Smurf Attack - send packets to exploit broadcast networks. Mailbomb - attempting to overflow a mailbox. Teardrop - sending fragments of packets to one computer. MAC Addresses - permanent identifier of a network device. o used to know where send things Hexadecimal - base-16 number system (0-9 & A-F) NIC - network interface card, a physical component on a computer or device that provides connectivity to a network. IEEE - Institute of Electrical Electronic Engineers - known for developing standards in the computer and electronics industries.TCP Handshake - a 3-way communication method using... o SYN (synchronize) o SYN-ACK (synchronize = acknowledge) o ACK (acknowledge) to establish a connection between hosts

Meer zien Lees minder
Instelling
Cybersecurity - PLTW EoC
Vak
Cybersecurity - PLTW EoC









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Cybersecurity - PLTW EoC
Vak
Cybersecurity - PLTW EoC

Documentinformatie

Geüpload op
3 juni 2024
Aantal pagina's
8
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€7,87
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Brainarium Delaware State University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1826
Lid sinds
2 jaar
Aantal volgers
1043
Documenten
22338
Laatst verkocht
1 dag geleden

3,8

317 beoordelingen

5
147
4
60
3
54
2
16
1
40

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen