100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CTSP REAL EXAM QUESTIONS WITH VERIFIED CORRECT SOLUTIONS || LATEST UPDATE

Rating
-
Sold
-
Pages
33
Grade
A+
Uploaded on
20-09-2024
Written in
2024/2025

CTSP REAL EXAM QUESTIONS WITH VERIFIED CORRECT SOLUTIONS || LATEST UPDATE Malware - ANSWER software designed to infiltrate a computer system and possibly damage it without the user's knowledge or consent Virus - ANSWER code that runs on a computer without the user's knowledge; it infects the computer when the code is accessed and executed (love bug virus) Worm - ANSWER like a virus except that it self-replicates, whereas a virus does not (nimda, propagated through network shares and mass e-mailing) Trojan Horse - ANSWER appear to perform desirable functions but are actually performing malicious functions behind the scenes (remote access trojan, plugx) Remote Access Trojan (RAT) - ANSWER their capability to allow an attacker higher administration privileges than those of the owner of the system makes them quite dangerous; most common type of Trojan Ransomware - ANSWER a type of malware that restricts access to a computer system and demands that a ransom be paid; also known as crypto-malware, it encrypts files and/or locks the system (often propagated via a trojan, cryptolocker) Spyware - ANSWER malicious software either downloaded unwittingly from a website or installed along with some other thirdparty software; usually collects information without the user's consent (internet optimizer - dyfuca) Adware - ANSWER usually falls into the realm of spyware because it pops up advertisements based on what it has learned from spying on the user Grayware - ANSWER describes applications that are behaving improperly but without serious consequences Rootkit - ANSWER a type of software designed to gain administrator-level control over a computer system without being detected (boot loader rootkits, evil maid attack, alureon) Spam - ANSWER the abuse of electronic messaging systems such as e-mail, texting, social media, broadcast media, instant messaging, and so on (identity theft e-mails [phishing], lottery scam e-mails) Threat Vector - ANSWER the method that a threat uses to access a target is known Attack Vector - ANSWER the means by which an attacker gains access to a computer in order to deliver malicious software; most common is via software Typosquatting - ANSWER when a user is attempting to access a website but types the incorrect domain name by mistake and the user is redirected to an altogether unwanted website that's malicious in nature Botnet - ANSWER malware distributed throughout the internet by a group of compromised computers Zombie - ANSWER the individual compromised computers in the botnet Active Interception - ANSWER normally includes a computer placed between the sender and the receiver to capture and possibly modify information Privilege Escalation - ANSWER the act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would've been protected from an application or user Backdoors - ANSWER used in computer programs to bypass normal authentication and other security mechanisms in place Logic Bomb - ANSWER code that has been inserted into software; it is meant to initiate one of many types of malicious functions when specific criteria are met Time Bomb - ANSWER trojans set off on a certain date Open Mail Relay - ANSWER enables anyone on the internet to send e-mail through the SMTP server; should either be closed or configured in such a way that only customers and properly authenticated users can use them Types of Viruses - ANSWER -boot sector -macro -program -encrypted -polymorphic -metamorphic -stealth -armored -multipartite Boot Sector - ANSWER initially loads into the first sector of the hard drive; when the computer boots, the virus then loads into memory Macro - ANSWER usually placed in documents and e-mailed to users in the hopes that the users will open the document, thus executing the virus Program - ANSWER infects executable files Encrypted - ANSWER uses a simple cipher to encrypt itself; the virus consists of an encrypted copy of the virus code (to help avoid detection) and a small decryption module Polymorphic - ANSWER builds on the concept of an encrypted virus, but the decrypting module is modified with each infection; it can change every time it is executed in an attempt to avoid antivirus detection Metamorphic - ANSWER similar to polymorphic but rewrites itself completely each time it is going to infect a new file in a further attempt to avoid detection Stealth - ANSWER uses various techniques to go unnoticed by antivirus programs Armored - ANSWER protects itself from antivirus programs by tricking the program into thinking that it is located in a different place from where it actually resides; essentially, it has a layer of protection that it can use against the person who tries to analyze it Multipartite - ANSWER a hybrid of boot and program viruses that attacks the boot sector or system files first and then attacks the other files on the system Removal of Malware - ANSWER 1. identify malware symptoms 2. quarantine infected systems 3. disable system restore (in windows) 4. remediate infected systems: a. update anti-ware software b. use scan and removal techniques (for example, Safe Mode and preinstallation environments) 5. schedule scans and run updates 6. enable system restore and create a restore point (in Windows) 7. educate end users Prevention technique: Virus - ANSWER -run and update antivirus software -scan the entire system periodically -update the operating system -use a firewall Prevention technique: Worm - ANSWER -run and update antivirus software -scan the entire system periodically Prevention technique: Trojan Horse - ANSWER -run and update antivirus software -scan the entire system periodically -run a Trojan scan periodically Prevention technique: Spyware - ANSWER -run and update anti-spyware -scan the entire system periodically -adjust web browser settings -consider technologies that discourage spyware Prevention technique: Rootkit - ANSWER -run and update antivirus software -use rootkit detector programs Prevention technique: Spam - ANSWER -use a spam filter -configure whitelists and blacklists -close open mail relays -train your users Mirepoix - ANSWER Roughly cut pieces Macedoine - ANSWER Dice Jaredinere - ANSWER Batons Julienne - ANSWER Thin strips Paysanne - ANSWER Thin, flat cuts of triangles, squares or rounds Brunoise - ANSWER Very fine dice Peel - ANSWER Remove skins from fruit or vegetables Skin - ANSWER Remove skin for poultry, meat or fish Chop - ANSWER Cut food into pieces Slice - ANSWER Cut into thin pieces the width of the food Dice - ANSWER Cut into cubes Chiffonade - ANSWER Thinly shredded foods Segment - ANSWER Citrus fruit removed from the membrane and skin Blanche 1 - ANSWER To cook food lightly in boiling water then plunge into cold water to retain colour Blanche 2 - ANSWER To plunge veg or fruit into boiling water then refreshed to allow peel to be removed Blanche 3 - ANSWER To place food in cold water, bring to boil to whiten (meats) Blanche 4 - ANSWER Cooking of potatoes in a deep fat fryer until soft but not coloured Blanche 5 - ANSWER To cook lightly to render limp (leaves) Concasse - ANSWER Coarsely chopped Pureé - ANSWER Cook fruits/vegetables , soups etc. passed through a sieve or processed using a hand blender Marinate - ANSWER Meats/vegetables/fruits soaked in a flavoursome mixture to enhance taste before cooking Strain - ANSWER To separate liquid from the solid by passing through a sieve or strainer pass - ANSWER To cause food to go through a sieve Grate - ANSWER To shred food into small pieces coat - ANSWER To add a thin layer of flor, oatmeal etc to delicate foods before frying Pane - ANSWER Food is coated in flour, egg then breadcrumbs or another suitable coating Mix - ANSWER Combine ingredients Blend - ANSWER To mix together dry ingredients with a liquid to make a paste Whisk - ANSWER Vigorous beating of ingredients such as eggs to increase volume Cream - ANSWER Working Butter and sugar together until light and fluffy fold - ANSWER Incorporating one ingredient into another to prevent losing air Rub-in - ANSWER Mixing fat and flour to create breadcrumb texture knead - ANSWER Manipulation of doughs to achieve correct texture Roll out - ANSWER Using a rolling pin to level and shape pastry to a required thickness

Show more Read less
Institution
CTSP
Course
CTSP

Content preview

CTSP REAL EXAM QUESTIONS
WITH VERIFIED CORRECT
SOLUTIONS || LATEST UPDATE


Malware - ANSWER ✔ software designed to infiltrate a computer
system and possibly damage it without the user's knowledge or
consent

Virus - ANSWER ✔ code that runs on a computer without the
user's knowledge; it infects the computer when the code is
accessed and executed (love bug virus)

Worm - ANSWER ✔ like a virus except that it self-replicates,
whereas a virus does not (nimda, propagated through network
shares and mass e-mailing)

Trojan Horse - ANSWER ✔ appear to perform desirable
functions but are actually performing malicious functions behind
the scenes (remote access trojan, plugx)

Remote Access Trojan (RAT) - ANSWER ✔ their capability to
allow an attacker higher administration privileges than those of
the owner of the system makes them quite dangerous; most
common type of Trojan

Ransomware - ANSWER ✔ a type of malware that restricts
access to a computer system and demands that a ransom be

,paid; also known as crypto-malware, it encrypts files and/or locks
the system (often propagated via a trojan, cryptolocker)

Spyware - ANSWER ✔ malicious software either downloaded
unwittingly from a website or installed along with some other third-
party software; usually collects information without the user's
consent (internet optimizer - dyfuca)

Adware - ANSWER ✔ usually falls into the realm of spyware
because it pops up advertisements based on what it has learned
from spying on the user

Grayware - ANSWER ✔ describes applications that are behaving
improperly but without serious consequences

Rootkit - ANSWER ✔ a type of software designed to gain
administrator-level control over a computer system without being
detected (boot loader rootkits, evil maid attack, alureon)

Spam - ANSWER ✔ the abuse of electronic messaging systems
such as e-mail, texting, social media, broadcast media, instant
messaging, and so on (identity theft e-mails [phishing], lottery
scam e-mails)

Threat Vector - ANSWER ✔ the method that a threat uses to
access a target is known

Attack Vector - ANSWER ✔ the means by which an attacker
gains access to a computer in order to deliver malicious software;
most common is via software

Typosquatting - ANSWER ✔ when a user is attempting to access
a website but types the incorrect domain name by mistake and

,the user is redirected to an altogether unwanted website that's
malicious in nature

Botnet - ANSWER ✔ malware distributed throughout the internet
by a group of compromised computers

Zombie - ANSWER ✔ the individual compromised computers in
the botnet

Active Interception - ANSWER ✔ normally includes a computer
placed between the sender and the receiver to capture and
possibly modify information

Privilege Escalation - ANSWER ✔ the act of exploiting a bug or
design flaw in a software or firmware application to gain access to
resources that normally would've been protected from an
application or user

Backdoors - ANSWER ✔ used in computer programs to bypass
normal authentication and other security mechanisms in place

Logic Bomb - ANSWER ✔ code that has been inserted into
software; it is meant to initiate one of many types of malicious
functions when specific criteria are met

Time Bomb - ANSWER ✔ trojans set off on a certain date

Open Mail Relay - ANSWER ✔ enables anyone on the internet to
send e-mail through the SMTP server; should either be closed or
configured in such a way that only customers and properly
authenticated users can use them

Types of Viruses - ANSWER ✔ -boot sector

, -macro
-program
-encrypted
-polymorphic
-metamorphic
-stealth
-armored
-multipartite

Boot Sector - ANSWER ✔ initially loads into the first sector of the
hard drive; when the computer boots, the virus then loads into
memory

Macro - ANSWER ✔ usually placed in documents and e-mailed
to users in the hopes that the users will open the document, thus
executing the virus

Program - ANSWER ✔ infects executable files

Encrypted - ANSWER ✔ uses a simple cipher to encrypt itself;
the virus consists of an encrypted copy of the virus code (to help
avoid detection) and a small decryption module

Polymorphic - ANSWER ✔ builds on the concept of an encrypted
virus, but the decrypting module is modified with each infection; it
can change every time it is executed in an attempt to avoid
antivirus detection

Metamorphic - ANSWER ✔ similar to polymorphic but rewrites
itself completely each time it is going to infect a new file in a
further attempt to avoid detection

Stealth - ANSWER ✔ uses various techniques to go unnoticed by
antivirus programs

Written for

Institution
CTSP
Course
CTSP

Document information

Uploaded on
September 20, 2024
Number of pages
33
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ProfBenjamin Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
540
Member since
1 year
Number of followers
16
Documents
3583
Last sold
1 day ago
EXCELLENT ACHIEVERS LIBRARY

As a professional tutor, I provide exceptional assistance with homework, quizzes, and exams across various subjects, including Psychology, Nursing, Biological Sciences, Business, Engineering, Human Resource Management, and Mathematics. I am dedicated to offering high-quality support and ensuring that all work meets scholarly standards. To enhance the effectiveness of our services, I work with a team of experienced tutors to create comprehensive and effective revision materials. Together, we are committed to helping students achieve excellent grades through our collaborative efforts and expertise.

Read more Read less
3.8

110 reviews

5
48
4
16
3
29
2
6
1
11

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions