ISTM 210 Exam 2 Latest 2024 Complete 170 Actual Exam Questions
with 100% Correct Verified Answers/ Graded A+
1. Computer Security concerned with risk management, confiden-
tiality, integrity, and the availability of the
electronic information that is processed and
stored within a computing system
2. risk management includes the recognition, consequences, and
assessment of risk to a computer's assets,
and developing strategies to manage and pro-
tect them
3. hacker also known as hacktivist, is somebody who
attempts to invade of disable a computer's
security measures and then to steal the com-
puter resources at their leisure
4. unsecured computer computer that is extremely easy to breach,
especially by a seasoned hacker
5. the key aspect of an intranet privacy
is ______
6. firewall entails specialized hardware and software
working together that only authorized person-
nel and employees within a business can use
its intranet
7. ________ keep unautho- firewalls
rized users out of private in-
tranets
8. any communications in or proxy server
out of an intranet pass
through a special secu-
rity computer called a
______________ as a pre-
caution to protect from any
external threats
9. port used to contain and delay structural fire from
spreading to contiguous buildings
, ISTM 210 Exam 2 Latest 2024
10. standard security practices default-deny
dictate a __________ fire-
wall rule set in that the
only network connections
that are permitted are the
ones that have been explic-
itly allowed
11. default-allow rule set in that all traffic is allowed unless it
has been specifically blocked
12. computer viruses computer files that reproduce by making
copies of them within a computer's memory,
storage, or on a network
13. metamorphic virus Are viruses can alter how the appear and
known to avoid detection.
14. malware programs specifically intended to penetrate or
damage a computer system without the end
user's knowledge
15. experimental malware written as research project to further under-
stand how to combat them
16. worms self-replicating but can be potentially more
insidious in that is does not need to attach
itself to an existing program to spread
17. Trojan horses program that often seems harmless and inter-
esting at fist until it is executed
18. spyware program that is installed covertly on a com-
puter to capture or take control of the system
without the user's knowledge or consent
19. adware also called advertising-supported software,
programs that automatically display or down-
load advertising to a computer
, ISTM 210 Exam 2 Latest 2024
20. spamming also called junk email, abuse of an email sys-
tem to arbitrarily send millions of on solicited
bulk messages
21. denial of service attack DoS for short, attempt to make a a computer
or any of its resources unavailable to its in-
tended users
22. reverse phishing/keylog- when a perpetrator logs onto a computer
ging workstation and installs a program that simply
records every keystroke made at the worksta-
tion's keyboard
23. antivirus software computer programs that attempt to identify,
prevent, and eliminate computer viruses and
malware
24. two popular antivirus pro- Symantec Corporation's Norton Antivirus and
grams are McAfee's VirusScan
25. system patches updates sent out to fix security threats in the
operating system
26. strong passwords longer in length than ordinary passwords, typ-
ically 8-12 characters
27. passphrase memorable strong password
28. internet fraud refers to any fraudulent activity in an online
setting; can occur through email systems,
message boards, chat rooms, or websites
29. click fraud manipulating the number of times an ad is
clicked on to inflate advertising bills
30. purchase scams involve a buyer typically in another country
that approaches merchants via spam and
asks if they can pay for shipping with a credit
card
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TestPrepPros. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.37. You're not tied to anything after your purchase.