100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Fundamentals of Cyber Security Questions and Answers 100% Correct R306,88   Add to cart

Exam (elaborations)

Fundamentals of Cyber Security Questions and Answers 100% Correct

 8 views  0 purchase
  • Course
  • Cyber Security
  • Institution
  • Cyber Security

Fundamentals of Cyber Security Questions and Answers 100% Correct what is adware A software program that delivers advertising content in a manner that is unexpected and unwanted by the user. normally this is to generate revenue what is a broswer hijacker a type of malware designed to chan...

[Show more]

Preview 2 out of 5  pages

  • September 17, 2024
  • 5
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Cyber Security
  • Cyber Security
avatar-seller
Fundamentals of Cyber Security
Questions and Answers 100% Correct

what is adware - answer software program that delivers advertising content in a manner
that is unexpected and unwanted by the user. normally this is to generate revenue

what is a browser hijacker - answer a type of malware designed to change your
browser's settings

DoS (Denial Of Service) is... - answer an attempt to make a computer or network
resource unavailable to its intended users. Although the means to carry out, motives for,
and targets of a DoS attack may vary, it generally consists of the efforts of one or more
people to temporarily or indefinitely interrupt or suspend services of a host connected to
the Internet.

Encryption = - answer The process of making data secret so that only the authorized
viewers can decrypt and read the data, and third parties cannot.
It does not prevent interception, only from it begin understood.

EULA stands for.... - answer End User License Agreement

Hacker can be defined as.... - answer A person who secretly gains access to computers
and files without permission.

Keystone Logger purpose = - answerrecord your keystrokes and record your internet
history

Malware - answersoftware designed to infiltrate or damage a computer system without
the user's informed consent

Mouse Trapping - answerTechnique used by some websites to keep visitors from
leaving their website, either by launching an endless series of pop-up ads or by re-
launching their website in a window that cannot be closed.

Phishing - answerAn attack that sends an email or displays a Web announcement that
falsely claims to be from a legitimate enterprise in an attempt to trick the user into
surrendering private information

Pharming - answerAn online scam that attacks the browser's address bar. Users type in
what they think is a valid website address and are unknowingly redirected to an
illegitimate site that steals their personal information.

, Spam - answerunwanted e-mail (usually of a commercial nature sent out in bulk)

Spyware - answerA type of Malware that locates and saves data from users without
them knowing about it. then sends it back to the attack instigator e.g. recording
passwords entered

Social Engineering - answerHackers use their social skills to trick people into revealing
access credentials or other valuable information because people, rather than
technology, are the weak points in any system

Virus - answerinsert themselves (the code) in normal programs, so when the host
program gets executed so does the virus. It becomes embedded into the host program,
just like how when you get sick the virus is within your body.

Trojan Horse Virus - answerinstalled inside other software, usually as an attachment or
a downloadable file that is desirable, but after some time it turns out to be something
else!

Zombie - answerA computer that is controlled by a hacker who uses it to launch attacks
on other computer systems.

what is malicious code - answeranything that modifies, deletes and steals data etc.
e.g. malware code; sql injection attack where you try to directly query a database;
backdoor; logic bomb

why is weak/default passwords a security threat - answerconstraints on passwords and
no default passwords to make it more difficult
Prompts you to change your password etc.

why is misconfigured access rights a security threat? - answerwhen people are given
permissions they shouldn't have eg a student has a teacher's account and has the
teacher's access rights.

why is removable media a security threat - answerBanning removable media - USB
devices can contain malware which may be automatically installed with autoplay. Can
bypass firewalls etc.
could have anti-malware scan on USB ports too

problems with unpatched software - answermay have security holes that have since
been fixed in newer releases but that the user hasn't installed. You are at risk for what
has then be patched in later software.

what is penetration testing - answerPenetration testing is the process of attempting to
gain access to resources without knowledge of usernames, passwords and other
normal means of access

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for R306,88. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

66579 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 14 years now

Start selling
R306,88
  • (0)
  Buy now