Cyber Security Exam |Complete Questions with A+ Graded Answers
4 views 0 purchase
Course
Cybersecurity
Institution
Cybersecurity
Cyber Security Exam
Instant Message
Common communication using a computer
ICMP
Internet Control Message Protocol. Used by a router to exchange information with other routers
Configuration Management
The process of keeping track of changes to the system, if needed, approving them.
...
cyber security exam instant message common communi
Written for
Cybersecurity
All documents for this subject (126)
Seller
Follow
EXAMSMART
Reviews received
Content preview
Cyber Security Exam
Instant Message
Common communication using a computer
ICMP
Internet Control Message Protocol. Used by a router to exchange information with other routers
Configuration Management
The process of keeping track of changes to the system, if needed, approving them.
Packet Sniffer
A device or program that monitors the data traveling between computers on a network
Gateway
A bridge two networks
Keywords
will block any website that to deal with certain predetermined keywords
Risk Analysis
The process of identifying security risks, determining their magnitude, and identifying areas needing
safeguards
Packet Filtering or Packet Purity
analyzed against a set of filters. That make it through the filters are sent to the requesting system and
others are discarded
Telnet
used to perform commands on a remote computers
Spyware
any software using someone's Internet connection in the background without their knowledge or
explicit permission. These applications are typically bundled as a hidden component of freeware or
shareware programs that can be downloaded from the Internet; however, it should be noted that
majority of shareware and freeware do not come with this. Once installed, this monitors user activity
on the Internet and transmits that information in the background to someone else. IT can also gather
information about e-mail addresses and even passwords and credit card numbers.
SMTP Session Hijacking
by gaining access to a list of e-mail addresses a person can send spam to thousands of users
Distributed Tool
A tool that can be distributed to multiple hosts, which can then be coordinated to anonymously
perform an attack on the target host simultaneously after some time delay
, Operation Controls
Security methods that focus on mechanisms that primarily are implemented and executed by people
(as opposed to systems)
Encryptions
the translation of data into a secret code; the most effective way to achieve data security. To read
these files, you must have access to a secret key or password that enables you to decrypt it
Audit Trail
A record showing who has accessed a computer system and what operations he or she has performed
during a given period of time. Useful both for maintaining security and for recovering lost transactions
Mobile Code
Software moduels obtained from remote systems, transferred across a network, and then
downloaded and executed on a local system without explicit installation or execution by the recipient,
Malicious types of this are designed, employed, distributed, or activated with the intention of
compromising the performance or security of information systems and computers, increasing access
to those systems disclosing unauthorized information, corrupting information, denying service, or
stealing resources.
Data Integrity
The state that exists when automated data is the same as that in source documents, or has been
correctly computed from source data, and has not been exposed to alteration or destruction
Digital Signature
A way to verify that an email message is really from the person who supposedly sent it and that it
hasn't been changed. You may have received emails that have a block of letters and numbers at the
bottom of the message - this mathematical algorithm is used to combine the information in the
message. The result is a random-looking string of letters and numbers.
Dictionary Attack
An attack that uses a brute-force technique of successively trying all the words in some large,
exhaustive list
SNMP
Simple Network Management Protocol. Used to collect system information from a remote computer
EULA
A contract between you and the software's vendor or developer. Some software packages state that
you agree to the contract by removing the shrink-wrap on the package. However, you may be more
familiar with the type of this that is presented as a dialog box that appears the first time you open the
software. It usually requires you to accept the conditions of the contract before you can proceed
Backup
A copy of data and/or applications contained in the IT stored on magnetic media outside of the IT to
be used in the event IT data are lost.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller EXAMSMART. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.