100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISA 235 Question and answers already passed

Beoordeling
-
Verkocht
-
Pagina's
6
Cijfer
A+
Geüpload op
08-11-2024
Geschreven in
2024/2025

ISA 235 Question and answers already passed ISA 235 4.2: Information Security downtime - correct answer refers to a period of time when a system is unavailable information security - correct answer the protection of information from accidental or intentional misuse by persons inside or outside of an organization hacker - correct answer experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the service or as a service to society Hacktivism = Hacker + Activism - correct answer the act of hacking or breaking into a system for a politically or socially motivated purpose black-hat hacker/cracker - correct answer break into other people's computer systems and may just look around or may steal and destroy information - crackers have

Meer zien Lees minder
Instelling
ISA 235
Vak
ISA 235

Voorbeeld van de inhoud

ISA 235 4.2: Information Security
downtime - correct answer ✔refers to a period of time when a system is
unavailable


information security - correct answer ✔the protection of information from
accidental or intentional misuse by persons inside or outside of an
organization


hacker - correct answer ✔experts in technology who use their knowledge to
break into computers and computer networks, either for profit or just motivated
by the service or as a service to society


Hacktivism = Hacker + Activism - correct answer ✔the act of hacking or
breaking into a system for a politically or socially motivated purpose


black-hat hacker/cracker - correct answer ✔break into other people's
computer systems and may just look around or may steal and destroy
information
- crackers have criminal intent when hacking


white-hat hacker - correct answer ✔work at the request of the system
owners to find system vulnerabilities and plug the holes


grey hacker - correct answer ✔some combination of white hat hacker and
black hat hacker


script kiddies or script bunnies - correct answer ✔find hacking code on the
Internet and click-and-point their way into systems to cause damage or spread
viruses

, virus - correct answer ✔software written with malicious intent to cause
annoyance or damage


backdoor programs - correct answer ✔open a way into the network for future
attacks


denial-of-service attack (DoS) - correct answer ✔floods a website with so
many requests for service that it slows down or crashes the site


distributed denial-of-service attack (DDoS) - correct answer ✔attacks from
multiple computers that flood a website with so many requests for service that
it slows down or crashes. A common type is the Ping of Death in which
thousands of computers try to access a website at the same time, overloading
it and shutting it down


polymorphic viruses and worms - correct answer ✔change their form as they
propagate


Trojan-horse virus - correct answer ✔hides inside other software, usually as
an attachment or a downloadable file


worm - correct answer ✔spreads itself not only from file to file but also from
computer to computer
- do not need to attach to anything to spread and can tunnel themselves into
computers


a virus must attach to something to spread, whereas worms do not need to
attach to anything to spread and can tunnel themselves into computers

Geschreven voor

Instelling
ISA 235
Vak
ISA 235

Documentinformatie

Geüpload op
8 november 2024
Aantal pagina's
6
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

  • isa 235

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Academia199 Chamberlain College Of Nursing
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
356
Lid sinds
3 jaar
Aantal volgers
209
Documenten
19290
Laatst verkocht
1 week geleden

3.9

51 beoordelingen

5
27
4
7
3
7
2
3
1
7

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen