100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

BTE 210 Midterm Exam Questions And Correct Answers

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
17-10-2024
Written in
2024/2025

BTE 210 Midterm Exam Questions And Correct Answers...

Institution
BTE 210
Course
BTE 210

Content preview

BTE 210 Midterm Exam Questions And Correct Answers



Unintentional threat - ANSWER An the actions conducted not with malicious intention
but nevertheless seriously threatening information security.

Espionage or trespass - ANSWER takes place when unauthorized person tries to get
illegal access to organizational information.



Information Extortion ANSWER When an attacker threatens to steal, or actually steals,
information from a company, it is called information extortion. The thief demands
payment for not releasing the information, returning stolen information, or promising not
to release the information.



Sabotage and Vandalism ANSWER Deliberate acts involve defacing an organization's
Web site that might destroy its image and make the customers lose faith in it.



Alien software - ANSWER clandestine soft ware that is installed on your computer
through duplicitous methods.



Supervisory Control and Data Acquisition Attacks (SCADA) - ANSWER refers to a
large-scale, distributed measurement and control system. SCADA systems are used to
monitor or to control chemical, physical, and transport processes such as those used in
oil refineries, water and sewage treatment plants, electrical generators, and nuclear
power plants.



cyberterrorism and cyberwarfare - ANSWER destructive acts in which an individual or
entity uses a target's computer systems, especially via the Internet, to destroy tangible
property or cause significant disruption, usually for political purposes. virus - ANSWER
A portion of computer code which can replicate itself, perform malicious activity, by
attaching to another computer program.



worm - ANSWER piece of code that behaves in a harmful manner and will replicate or
spread itself without the necessity of another program.

, phishing attack - ANSWER trick people into revealing personal information via e-mail
messages, instant messages, etc., that seem to be authentic.



spear phishing - ANSWER Phishing attacks are directed at large numbers of people. In
spear phishing attacks, the perpetrators learn as much about an individual as possible
to increase their chances that phishing techniques will successfully retrieve sensitive,
personal information

denial-of-service attack - ANSWER An attacker sends so many information requests to a
target computer system that the target cannot process them effectively and usually
crashes (stops functioning).



distributed denial-of-service attack - ANSWER An attacker first takes over many
computers, usually by using malicious soft ware. These computers are called zombies
or bots. The attacker uses these bots—which form a botnet—to deliver a coordinated
stream of information requests to a target computer, thereby forcing it to crash.



Trojan horse - ANSWER Software programs that hide in other computer programs and
reveal their designed behavior only when they become activated.



back door - ANSWER Usually a password, only known to the attacker, it permits him or
her to enter any time, bypassing security procedures (also called a trap door).



logic bomb - ANSWER A fragment of computer code buried within an organization's
existing computer programs designed to strike at some future time or date to wreak
havoc.



alien software - ANSWER A hidden program put on your computer by surreptitious
means



adware - ANSWER A set of programs that make pop-up ads appear on your screen.



spyware- ANSWER soft ware that collects personal information about users without

Written for

Institution
BTE 210
Course
BTE 210

Document information

Uploaded on
October 17, 2024
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Easton West Virgina University
View profile
Follow You need to be logged in order to follow users or courses
Sold
526
Member since
3 year
Number of followers
221
Documents
25505
Last sold
1 day ago

3.9

113 reviews

5
53
4
21
3
22
2
7
1
10

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions