100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ISTM 210 Final Exam Questions and Answers 100% Correct | Latest Update 2024 $13.99   Add to cart

Exam (elaborations)

ISTM 210 Final Exam Questions and Answers 100% Correct | Latest Update 2024

 40 views  0 purchase
  • Course
  • ISTM 210
  • Institution
  • ISTM 210

ISTM 210 Final Exam Questions and Answers 100% Correct | Latest Update 2024

Preview 4 out of 31  pages

  • March 13, 2024
  • 31
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • risk management
  • computer security
  • ISTM 210
  • ISTM 210
avatar-seller
professoraxel
ISTM 210 Final Exam Questions and Answers 100% Correct | Latest Update 2024
Computer Security - Correct Answer-concerned with risk management, confidentiality, integrity, and the availability of the electronic information that is processed and stored within a computing system
risk management - Correct Answer-includes the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them
hacker - Correct Answer-also known as hacktivist, is somebody who attempts to invade of disable a computer's security measures and then to steal the computer resources at
their leisure
unsecured computer - Correct Answer-computer that is extremely easy to breach, especially by a seasoned hacker
the key aspect of an intranet is ______ - Correct Answer-
privacy pg. 1 professoraxe l firewall - Correct Answer-entails specialized hardware and software working together that only authorized personnel and
employees within a business can use its intranet
________ keep unauthorized users out of private intranets - Correct Answer-firewalls
any communications in or out of an intranet pass through a special security computer called a ______________ as a precaution to protect from any external threats - Correct Answer-proxy server
port - Correct Answer-used to contain and delay structural fire
from spreading to contiguous buildings
standard security practices dictate a __________ firewall rule set in that the only network connections that are permitted are the ones that have been explicitly allowed - Correct Answer-default-deny
default-allow - Correct Answer-rule set in that all traffic is allowed unless it has been specifically blocked pg. 2 professoraxe l computer viruses - Correct Answer-computer files that reproduce by making copies of them within a computer's memory, storage, or on a network
metamorphic virus - Correct Answer-Are viruses can alter how
the appear and known to avoid detection.
malware - Correct Answer-programs specifically intended to penetrate or damage a computer system without the end user's knowledge
experimental malware - Correct Answer-written as research project to further understand how to combat them
worms - Correct Answer-self-replicating but can be potentially
more insidious in that is does not need to attach itself to an existing program to spread
Trojan horses - Correct Answer-program that often seems harmless and interesting at fist until it is executed pg. 3 professoraxe l spyware - Correct Answer-program that is installed covertly on a computer to capture or take control of the system without the user's knowledge or consent
adware - Correct Answer-also called advertising-supported software, programs that automatically display or download advertising to a computer
spamming - Correct Answer-also called junk email, abuse of an
email system to arbitrarily send millions of on solicited bulk messages
denial of service attack - Correct Answer-DoS for short, attempt to make a a computer or any of its resources unavailable to its intended users
reverse phishing/keylogging - Correct Answer-when a perpetrator logs onto a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard pg. 4 professoraxe l

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller professoraxel. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76658 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.99
  • (0)
  Add to cart