ISTM 210 FINAL EXAM PREP 2025/2026 ACCURATE
QUESTIONS WITH CORRECT DETAILED ANSWERS ||
100% GUARANTEED PASS <BRAND NEW VERSION>
Computer Security .......Answer.........concerned with risk
management, confidentiality, integrity, and the availability of
the electronic information that is processed and stored within a
computing system
risk management .......Answer.........includes the recognition,
consequences, and assessment of risk to a computer's assets, and
developing strategies to manage and protect them
hacker .......Answer.........also known as hacktivist, is somebody
who attempts to invade of disable a computer's security
measures and then to steal the computer resources at their
leisure
,age 2 of 40
unsecured computer .......Answer.........computer that is extremely
easy to breach, especially by a seasoned hacker
the key aspect of an intranet is ______ .......Answer.........privacy
firewall .......Answer.........entails specialized hardware and
software working together that only authorized personnel and
employees within a business can use its intranet
________ keep unauthorized users out of private intranets
.......Answer.........firewalls
any communications in or out of an intranet pass through a
special security computer called a ______________ as a
precaution to protect from any external threats
.......Answer.........proxy server
,age 3 of 40
port .......Answer.........used to contain and delay structural fire
from spreading to contiguous buildings
standard security practices dictate a __________ firewall rule
set in that the only network connections that are permitted are
the ones that have been explicitly allowed
.......Answer.........default-deny
default-allow .......Answer.........rule set in that all traffic is
allowed unless it has been specifically blocked
computer viruses .......Answer.........computer files that reproduce
by making copies of them within a computer's memory, storage,
or on a network
metamorphic virus .......Answer.........Are viruses can alter how the
appear and known to avoid detection.
, age 4 of 40
malware .......Answer.........programs specifically intended to
penetrate or damage a computer system without the end user's
knowledge
experimental malware .......Answer.........written as research
project to further understand how to combat them
worms .......Answer.........self-replicating but can be potentially
more insidious in that is does not need to attach itself to an
existing program to spread
Trojan horses .......Answer.........program that often seems harmless
and interesting at fist until it is executed
spyware .......Answer.........program that is installed covertly on a
computer to capture or take control of the system without the
user's knowledge or consent