100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
BTE 210 Midterm Exam Questions And Correct Answers $9.99   Add to cart

Exam (elaborations)

BTE 210 Midterm Exam Questions And Correct Answers

 1 view  0 purchase
  • Course
  • BTE 210
  • Institution
  • BTE 210

BTE 210 Midterm Exam Questions And Correct Answers...

Preview 2 out of 10  pages

  • October 17, 2024
  • 10
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • BTE 210
  • BTE 210
avatar-seller
Easton
BTE 210 Midterm Exam Questions And Correct Answers



Unintentional threat - ANSWER An the actions conducted not with malicious intention
but nevertheless seriously threatening information security.

Espionage or trespass - ANSWER takes place when unauthorized person tries to get
illegal access to organizational information.



Information Extortion ANSWER When an attacker threatens to steal, or actually steals,
information from a company, it is called information extortion. The thief demands
payment for not releasing the information, returning stolen information, or promising not
to release the information.



Sabotage and Vandalism ANSWER Deliberate acts involve defacing an organization's
Web site that might destroy its image and make the customers lose faith in it.



Alien software - ANSWER clandestine soft ware that is installed on your computer
through duplicitous methods.



Supervisory Control and Data Acquisition Attacks (SCADA) - ANSWER refers to a
large-scale, distributed measurement and control system. SCADA systems are used to
monitor or to control chemical, physical, and transport processes such as those used in
oil refineries, water and sewage treatment plants, electrical generators, and nuclear
power plants.



cyberterrorism and cyberwarfare - ANSWER destructive acts in which an individual or
entity uses a target's computer systems, especially via the Internet, to destroy tangible
property or cause significant disruption, usually for political purposes. virus - ANSWER
A portion of computer code which can replicate itself, perform malicious activity, by
attaching to another computer program.



worm - ANSWER piece of code that behaves in a harmful manner and will replicate or
spread itself without the necessity of another program.

, phishing attack - ANSWER trick people into revealing personal information via e-mail
messages, instant messages, etc., that seem to be authentic.



spear phishing - ANSWER Phishing attacks are directed at large numbers of people. In
spear phishing attacks, the perpetrators learn as much about an individual as possible
to increase their chances that phishing techniques will successfully retrieve sensitive,
personal information

denial-of-service attack - ANSWER An attacker sends so many information requests to a
target computer system that the target cannot process them effectively and usually
crashes (stops functioning).



distributed denial-of-service attack - ANSWER An attacker first takes over many
computers, usually by using malicious soft ware. These computers are called zombies
or bots. The attacker uses these bots—which form a botnet—to deliver a coordinated
stream of information requests to a target computer, thereby forcing it to crash.



Trojan horse - ANSWER Software programs that hide in other computer programs and
reveal their designed behavior only when they become activated.



back door - ANSWER Usually a password, only known to the attacker, it permits him or
her to enter any time, bypassing security procedures (also called a trap door).



logic bomb - ANSWER A fragment of computer code buried within an organization's
existing computer programs designed to strike at some future time or date to wreak
havoc.



alien software - ANSWER A hidden program put on your computer by surreptitious
means



adware - ANSWER A set of programs that make pop-up ads appear on your screen.



spyware- ANSWER soft ware that collects personal information about users without

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Easton. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81311 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart