cs 161 Exam |Questions with Correct Verified
Answers
How does a firewall work - ANSWER Incoming and outgoing network traffic is routed through
the firewall, the firewall examines each messages and blocks any communication that does
not meet the security criteria
How to secure a wireless network - ANSWER Router should require a security code to
gain acces, Set the encryption for the router or device to the highest standard offered,
Network attack - ANSWER Attack on computers network that causes a disruptive service
Botnet - ANSWER A collection of zombie computers that work together to conduct an attack on
another network
Uses of botnets - ANSWER send spam emails, spread viruses, steal personal data or conduct
a denial of service attack
zombie compuer - ANSWER A computer connected to the Internet and controlled by a
hacker without the owners knowledge
How does a computer become a zombie? - ANSWER being infected by viruses that is hidden
to the user and is controlled remotely by the hacker
Denial of service - ANSWER Occurs when a botnet attacks a network by sending a
constant stream of messages that overwhelms the server so that it slows down or
completely shuts down
, Targets of denial of service - ANSWER well known companies or government agenicies
How to prevent a network attack - ANSWER -Scan your device
regularly - update OS regularly
-Make sure a firewall is always active
HOW TO KNOW IF YOUR COMPUTER IS COMPRIMISED - ANSWER -Internet connectivity
slows down
-Activity occurs when you are not running any
programs -Key board or mouse become unresponsive
-A different default website appears when you open the
browser -New desktop icons or tool bars appear
Malware? - ANSWER Software that has malicious intent
What does malware target - ANSWER -Damage, modify, delete
files -steal personal data
- track users activity
- use your computer to launch unwanted activities somewhere else
- Fills up memory and storage space w/ copies of itself
How does malware spread? - ANSWER -Plugging into a infected outside device
-Opening infected email attachments
- Clicking on spoofed links
- via social engineering
- through person 2 person file sharing
- via Bluetooth & mms file transfers
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KenAli. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.