100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
WGU D385 SOFTWARE SECURITY AND TESTING EXAM LATEST 2024 COMPLETE REAL EXAM QUESTIONS AND CORRECT VERIFIED SOLUTIONS (A NEW UPDATED VERSION) |GUARANTEED PASS A+ (BRAND NEW!!)$17.99
Add to cart
wgu d385 software security and testing exam latest
wgu d385 software security
Connected book
Book Title:
Author(s):
Edition:
ISBN:
Edition:
Written for
WGU D385 SOFTWARE SECURITY AND TESTING
All documents for this subject (9)
Seller
Follow
knoowy96
Content preview
WGU D385 SOFTWARE SECURITY AND TESTING EXAM LATEST
2024 COMPLETE REAL EXAM QUESTIONS AND CORRECT
VERIFIED SOLUTIONS (A NEW UPDATED VERSION) |
GUARANTEED PASS A+ (BRAND NEW!!)
Digital security risk - ANSWER: any event or action that could cause loss of or
damage to computer or mobile device hardware, software, data, information, or
processing capability
Computer crime - ANSWER: any illegal act involving the use of a computer or related
devices generally
cybercrime - ANSWER: online or internet-based illegal acts
crimeware - ANSWER: software used by cybercriminals
hacker - ANSWER: someone who accesses a computer or network illegally
cracker - ANSWER: has the intent of destroying data, stealing information,or other
malicious action
script kiddie - ANSWER: has the same intent as a cracker but does not have the
technical skills and knowledge
cyberextortionist - ANSWER: someone who demands payment to stop an attack on
an organization's technology infrastructure
cyberterrorist - ANSWER: someone who uses the internet or network to destroy or
damage computers for political reasons
malware - ANSWER: programs that act without a users knowledge and deliberately
alter the operations of computers and mobile devices
virus - ANSWER: potentially damaging program that affects, or infects a computer or
mobile device negatively
worm - ANSWER: program that copies itself repeatedly
trojan horse - ANSWER: program that hides within or looks like a legitimate program
rootkit - ANSWER: program that hides within a computer and allows someone from a
remote location to take full control of the computer
spyware - ANSWER: program placed on a computer without the users knowledge
that secretly collects info about the user and then communicates info about the user
, adware - ANSWER: online advertisement in a banner or pop-up window on web ages
email messages, or other internet services
botnet - ANSWER: group of compromised computers or mobile devices connected to
a network such as the internet that are used to attack other networks
zombie - ANSWER: a compromised computer or device
bot - ANSWER: a program that performs a repetitive task
doS attack - ANSWER: an assault whose purpose is to disrupt computer access to an
internet service such as the web or email
back door - ANSWER: a program or set of instructions in a program that allows user
to bypass security control
spoofing - ANSWER: technique intruders use to make their network or internet
transmission appear legitimate to a victim computer
firewall - ANSWER: hardware or software that protects a networks resources from
intrusion by users on another network
personal firewall - ANSWER: software firewall that detects and protects a personal
computer and its data
unauthorized access - ANSWER: the use of a computer without permission
acceptable use policy - ANSWER: outlines the activities for which the computer may
or may not be used
access control - ANSWER: security measure that defines who can access a computer,
when they can access it, and what actions they can take when accessing it
password - ANSWER: private combo of characters associated with the user name
user name - ANSWER: unique combo of characters, such as letters or numbers that
identifies one user
CAPTCHA - ANSWER: displays an image containing a series of distorted characters for
a user to identify and enter in order to verify that user input is from humans
PIN - ANSWER: numeric password
biometric device - ANSWER: authenticates a persons identity by translating a
personal characteristic such as fingerprint into a digital code that is compared with a
digital code in a computer verifying a physical or behavioral characteristic
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller knoowy96. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.