ISTM 210 Phinney Exam 4 With Solutions 100% Correct
5 views 0 purchase
Course
ISTM 210
Institution
ISTM 210
ISTM 210 Phinney Exam 4 With Solutions
100% Correct
Firewall specialized hardware and software that ensures that only authorized personnel
can access and use an organization's intranet
Proxy Server Special security computer used as a precaution to protect from any external
threats
Port use...
ISTM 210 Phinney Exam 4 With Solutions
100% Correct
Firewall specialized hardware and software that ensures that only authorized personnel
can access and use an organization's intranet
Proxy Server Special security computer used as a precaution to protect from any external
threats
Port used to contain and delay viruses from spreading in a system
Default-deny firewall rule that only allows network connections that have been permitted
Default-allow rule set in that all traffic is allowed unless it has been specifically blocked.
Makes system compromise much more likely.
computer virus programs that reproduce by making copies of their files within a
computer's memory, storage, or network
Metamorphic Virus A virus that alters how it appears to avoid detection.
, ISTM 210 Phinney Exam 4 With Solutions
100% Correct
Malware programs specifically intended to damage a computer system without the end
user's knowledge
Experimental Malware written as a research project to further understand how to combat
viruses
Worms similar to viruses but more dangerous because they do not need to attach
themselves to an existing program to spread
Trojan Horse a program that appears desirable but actually contains something harmful
Spyware A program which is covertly installed on a computer to capture or take control of
the system without the user's knowledge
Adware Programs that automatically display or download advertisements to a computer
Spam Unsolicited emails
, ISTM 210 Phinney Exam 4 With Solutions
100% Correct
Denial-of-Service (DoS) attack Attempt to make a computer or any of its resources
unavailable to its intended user
Reverse phising/ Keylogging A program which records keystrokes to gather sensitive
information
antivirus software programs which identify, prevent, and eliminate computer viruses and
malware.
System patches online updates to increase security
Strong password Typically 8-12 characters, usually including mixed case letters, numbers,
and special characters
Passphrase a memorable strong password
Internet Fraud any fraudulent activity in an online setting
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller UpperClass. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $20.49. You're not tied to anything after your purchase.