100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Cyber Security Exam |Complete Questions with A+ Graded Answers $9.59   Add to cart

Exam (elaborations)

Cyber Security Exam |Complete Questions with A+ Graded Answers

 4 views  0 purchase
  • Course
  • Institution

Cyber Security Exam Instant Message Common communication using a computer ICMP Internet Control Message Protocol. Used by a router to exchange information with other routers Configuration Management The process of keeping track of changes to the system, if needed, approving them. ...

[Show more]

Preview 2 out of 9  pages

  • April 18, 2024
  • 9
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Cyber Security Exam
Instant Message
Common communication using a computer


ICMP
Internet Control Message Protocol. Used by a router to exchange information with other routers


Configuration Management
The process of keeping track of changes to the system, if needed, approving them.


Packet Sniffer
A device or program that monitors the data traveling between computers on a network


Gateway
A bridge two networks


Keywords
will block any website that to deal with certain predetermined keywords


Risk Analysis
The process of identifying security risks, determining their magnitude, and identifying areas needing
safeguards


Packet Filtering or Packet Purity
analyzed against a set of filters. That make it through the filters are sent to the requesting system and
others are discarded


Telnet
used to perform commands on a remote computers


Spyware
any software using someone's Internet connection in the background without their knowledge or
explicit permission. These applications are typically bundled as a hidden component of freeware or
shareware programs that can be downloaded from the Internet; however, it should be noted that
majority of shareware and freeware do not come with this. Once installed, this monitors user activity
on the Internet and transmits that information in the background to someone else. IT can also gather
information about e-mail addresses and even passwords and credit card numbers.


SMTP Session Hijacking
by gaining access to a list of e-mail addresses a person can send spam to thousands of users


Distributed Tool
A tool that can be distributed to multiple hosts, which can then be coordinated to anonymously
perform an attack on the target host simultaneously after some time delay

, Operation Controls
Security methods that focus on mechanisms that primarily are implemented and executed by people
(as opposed to systems)


Encryptions
the translation of data into a secret code; the most effective way to achieve data security. To read
these files, you must have access to a secret key or password that enables you to decrypt it


Audit Trail
A record showing who has accessed a computer system and what operations he or she has performed
during a given period of time. Useful both for maintaining security and for recovering lost transactions


Mobile Code
Software moduels obtained from remote systems, transferred across a network, and then
downloaded and executed on a local system without explicit installation or execution by the recipient,
Malicious types of this are designed, employed, distributed, or activated with the intention of
compromising the performance or security of information systems and computers, increasing access
to those systems disclosing unauthorized information, corrupting information, denying service, or
stealing resources.


Data Integrity
The state that exists when automated data is the same as that in source documents, or has been
correctly computed from source data, and has not been exposed to alteration or destruction


Digital Signature
A way to verify that an email message is really from the person who supposedly sent it and that it
hasn't been changed. You may have received emails that have a block of letters and numbers at the
bottom of the message - this mathematical algorithm is used to combine the information in the
message. The result is a random-looking string of letters and numbers.


Dictionary Attack
An attack that uses a brute-force technique of successively trying all the words in some large,
exhaustive list


SNMP
Simple Network Management Protocol. Used to collect system information from a remote computer


EULA
A contract between you and the software's vendor or developer. Some software packages state that
you agree to the contract by removing the shrink-wrap on the package. However, you may be more
familiar with the type of this that is presented as a dialog box that appears the first time you open the
software. It usually requires you to accept the conditions of the contract before you can proceed


Backup
A copy of data and/or applications contained in the IT stored on magnetic media outside of the IT to
be used in the event IT data are lost.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICAIDSTORE. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.59. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80461 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.59
  • (0)
  Add to cart