100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ISTM 210 Exam 2 Latest 2024 Complete 170 Actual Exam Questions with 100% Correct Verified Answers/ Graded A+ $13.37
Add to cart

Exam (elaborations)

ISTM 210 Exam 2 Latest 2024 Complete 170 Actual Exam Questions with 100% Correct Verified Answers/ Graded A+

 2 views  0 purchase
  • Course
  • Institution

ISTM 210 Exam 2 Latest 2024 Complete 170 Actual Exam Questions with 100% Correct Verified Answers/ Graded A+

Preview 3 out of 19  pages

  • January 1, 2025
  • 19
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
avatar-seller
ISTM 210 Exam 2 Latest 2024 Complete 170 Actual Exam Questions
with 100% Correct Verified Answers/ Graded A+

1. Computer Security concerned with risk management, confiden-
tiality, integrity, and the availability of the
electronic information that is processed and
stored within a computing system

2. risk management includes the recognition, consequences, and
assessment of risk to a computer's assets,
and developing strategies to manage and pro-
tect them

3. hacker also known as hacktivist, is somebody who
attempts to invade of disable a computer's
security measures and then to steal the com-
puter resources at their leisure

4. unsecured computer computer that is extremely easy to breach,
especially by a seasoned hacker

5. the key aspect of an intranet privacy
is ______

6. firewall entails specialized hardware and software
working together that only authorized person-
nel and employees within a business can use
its intranet

7. ________ keep unautho- firewalls
rized users out of private in-
tranets

8. any communications in or proxy server
out of an intranet pass
through a special secu-
rity computer called a
______________ as a pre-
caution to protect from any
external threats

9. port used to contain and delay structural fire from
spreading to contiguous buildings


, ISTM 210 Exam 2 Latest 2024


10. standard security practices default-deny
dictate a __________ fire-
wall rule set in that the
only network connections
that are permitted are the
ones that have been explic-
itly allowed

11. default-allow rule set in that all traffic is allowed unless it
has been specifically blocked

12. computer viruses computer files that reproduce by making
copies of them within a computer's memory,
storage, or on a network

13. metamorphic virus Are viruses can alter how the appear and
known to avoid detection.

14. malware programs specifically intended to penetrate or
damage a computer system without the end
user's knowledge

15. experimental malware written as research project to further under-
stand how to combat them

16. worms self-replicating but can be potentially more
insidious in that is does not need to attach
itself to an existing program to spread

17. Trojan horses program that often seems harmless and inter-
esting at fist until it is executed

18. spyware program that is installed covertly on a com-
puter to capture or take control of the system
without the user's knowledge or consent

19. adware also called advertising-supported software,
programs that automatically display or down-
load advertising to a computer


, ISTM 210 Exam 2 Latest 2024

20. spamming also called junk email, abuse of an email sys-
tem to arbitrarily send millions of on solicited
bulk messages

21. denial of service attack DoS for short, attempt to make a a computer
or any of its resources unavailable to its in-
tended users

22. reverse phishing/keylog- when a perpetrator logs onto a computer
ging workstation and installs a program that simply
records every keystroke made at the worksta-
tion's keyboard

23. antivirus software computer programs that attempt to identify,
prevent, and eliminate computer viruses and
malware

24. two popular antivirus pro- Symantec Corporation's Norton Antivirus and
grams are McAfee's VirusScan

25. system patches updates sent out to fix security threats in the
operating system

26. strong passwords longer in length than ordinary passwords, typ-
ically 8-12 characters

27. passphrase memorable strong password

28. internet fraud refers to any fraudulent activity in an online
setting; can occur through email systems,
message boards, chat rooms, or websites

29. click fraud manipulating the number of times an ad is
clicked on to inflate advertising bills

30. purchase scams involve a buyer typically in another country
that approaches merchants via spam and
asks if they can pay for shipping with a credit
card

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TestPrepPros. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.37. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

56880 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 15 years now

Start selling
$13.37
  • (0)
Add to cart
Added