Fundamentals of Cyber Security Questions and Answers 100% Correct
8 views 0 purchase
Course
Cyber Security
Institution
Cyber Security
Fundamentals of Cyber Security Questions and Answers 100% Correct
what is adware
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user. normally this is to generate revenue
what is a broswer hijacker
a type of malware designed to chan...
Fundamentals of Cyber Security
Questions and Answers 100% Correct
what is adware - answer software program that delivers advertising content in a manner
that is unexpected and unwanted by the user. normally this is to generate revenue
what is a browser hijacker - answer a type of malware designed to change your
browser's settings
DoS (Denial Of Service) is... - answer an attempt to make a computer or network
resource unavailable to its intended users. Although the means to carry out, motives for,
and targets of a DoS attack may vary, it generally consists of the efforts of one or more
people to temporarily or indefinitely interrupt or suspend services of a host connected to
the Internet.
Encryption = - answer The process of making data secret so that only the authorized
viewers can decrypt and read the data, and third parties cannot.
It does not prevent interception, only from it begin understood.
EULA stands for.... - answer End User License Agreement
Hacker can be defined as.... - answer A person who secretly gains access to computers
and files without permission.
Keystone Logger purpose = - answerrecord your keystrokes and record your internet
history
Malware - answersoftware designed to infiltrate or damage a computer system without
the user's informed consent
Mouse Trapping - answerTechnique used by some websites to keep visitors from
leaving their website, either by launching an endless series of pop-up ads or by re-
launching their website in a window that cannot be closed.
Phishing - answerAn attack that sends an email or displays a Web announcement that
falsely claims to be from a legitimate enterprise in an attempt to trick the user into
surrendering private information
Pharming - answerAn online scam that attacks the browser's address bar. Users type in
what they think is a valid website address and are unknowingly redirected to an
illegitimate site that steals their personal information.
, Spam - answerunwanted e-mail (usually of a commercial nature sent out in bulk)
Spyware - answerA type of Malware that locates and saves data from users without
them knowing about it. then sends it back to the attack instigator e.g. recording
passwords entered
Social Engineering - answerHackers use their social skills to trick people into revealing
access credentials or other valuable information because people, rather than
technology, are the weak points in any system
Virus - answerinsert themselves (the code) in normal programs, so when the host
program gets executed so does the virus. It becomes embedded into the host program,
just like how when you get sick the virus is within your body.
Trojan Horse Virus - answerinstalled inside other software, usually as an attachment or
a downloadable file that is desirable, but after some time it turns out to be something
else!
Zombie - answerA computer that is controlled by a hacker who uses it to launch attacks
on other computer systems.
what is malicious code - answeranything that modifies, deletes and steals data etc.
e.g. malware code; sql injection attack where you try to directly query a database;
backdoor; logic bomb
why is weak/default passwords a security threat - answerconstraints on passwords and
no default passwords to make it more difficult
Prompts you to change your password etc.
why is misconfigured access rights a security threat? - answerwhen people are given
permissions they shouldn't have eg a student has a teacher's account and has the
teacher's access rights.
why is removable media a security threat - answerBanning removable media - USB
devices can contain malware which may be automatically installed with autoplay. Can
bypass firewalls etc.
could have anti-malware scan on USB ports too
problems with unpatched software - answermay have security holes that have since
been fixed in newer releases but that the user hasn't installed. You are at risk for what
has then be patched in later software.
what is penetration testing - answerPenetration testing is the process of attempting to
gain access to resources without knowledge of usernames, passwords and other
normal means of access
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $16.49. You're not tied to anything after your purchase.