WGU C702 Forensics and Network Intrusion Knowledge Check with complete solutions |Latest 2024/2025
8 vistas 0 veces vendidas
Grado
WGU C702
Institución
WGU C702
Information Security [IT Security] Securing information protects information and information systems from illegal access, use, modification, or destruction. It ensures confidentiality, integrity, and availability of data.
Network-Based intrusion detection: A network-based ID system monitors ...
Knowledge Check with complete solutions. i- i- i- i- i-
Information Security [IT Security] Securing information protects
i- i- i- i-i- i- i- i- i-
information and information systems from illegal access, use,
i- i- i- i- i- i- i- i-
modification, or destruction. It ensures confidentiality, integrity, and
i- i- i- i- i- i- i- i-
availability of data. i- i-
Network-Based intrusion detection: A network-based ID system i- i- i-i- i- i- i- i- i-
monitors the traffic on its network segment as a data source
i- i- i- i- i- i- i- i- i- i-
DNS Redirection:
i- DNS redirection is the controversial practice of i-i- i- i- i- i- i- i- i- i-
serving a Web page to a user that is different from either the one
i- i- i- i- i- i- i- i- i- i- i- i- i- i-
requested or one that might reasonably be expected, such as an error
i- i- i- i- i- i- i- i- i- i- i- i-
page
Router Cache: i- The database of addresses and forwarding i-i- i- i- i- i- i- i- i-
information of network traffic stored in a router. It can also provide
i- i- i- i- i- i- i- i- i- i- i- i-
information about attacks i- i-
Session Poisoning: i- is a method to exploit insufficient input validation i-i- i- i- i- i- i- i- i- i- i-
within a server application. Typically a server application that is
i- i- i- i- i- i- i- i- i- i-
vulnerable to this type of exploit will copy user input into session
i- i- i- i- i- i- i- i- i- i- i- i-
variables
,Configuration management The process of keeping track of all i- i-i- i- i- i- i- i- i- i- i-
changes made to hardware, software, and firmware throughout the life
i- i- i- i- i- i- i- i- i- i-
of a system; source code management and revision control are part of
i- i- i- i- i- i- i- i- i- i- i- i-
this
Hash Injection Attack:
i- It's when the attacker injects a compromised i- i-i- i- i- i- i- i- i- i- i-
hash into a local session and use that same hash to validate the network
i- i- i- i- i- i- i- i- i- i- i- i- i- i-
resources of that particular network i- i- i- i-
Network Security [IT Security] Networks are used to send important
i- i- i- i-i- i- i- i- i- i- i- i-
and private data from one system to another. Networks should be
i- i- i- i- i- i- i- i- i- i- i-
secured for safe transfer of data. Damage to the network makes the data
i- i- i- i- i- i- i- i- i- i- i- i- i-
transfer vulnerable and may crash the system.
i- i- i- i- i- i-
Facilities Security [Physical Security] Facilities and an organization's
i- i- i- i-i- i- i- i- i- i-
equipment should be properly and highly secured. Damage to facilities
i- i- i- i- i- i- i- i- i- i-
can cause physical harm such as a system crash or power failure.
i- i- i- i- i- i- i- i- i- i- i-
Human Security [Physical Security]
i- The employees of an i- i- i-i- i- i- i- i- i-
organization should be given security awareness training and be involved
i- i- i- i- i- i- i- i- i- i-
in the entire business security process in order to gain their trust and
i- i- i- i- i- i- i- i- i- i- i- i- i-
acceptance of the security policy. Ignoring human security concerns can
i- i- i- i- i- i- i- i- i- i-
cause employees to leave, leading to loss of business.
i- i- i- i- i- i- i- i-
Financial Security i- i-i- i- Consists of: i-
i- Security from frauds; i- i-
, i- Phishing attacks; i-
i- Botnets;
i- Threats from cyber criminals;
i- i- i-
i- Credit card fraud;
i- i-
Security from fraud [Financial Security]
i- To function properly and
i- i- i- i-i- i- i- i- i- i-
negate losses, an organization must be financially secure from both
i- i- i- i- i- i- i- i- i- i-
internal and external threats. Security breaches may be caused by data
i- i- i- i- i- i- i- i- i- i- i-
manipulations, system vulnerabilities and threats, or data theft. i- i- i- i- i- i- i-
Physical Security i- i-i- i- Consists of: i- i-
Facilities security: i-
Human security: i-
Border security; i-
Biometric security; i-
Legal Security
i- i-i- Consists of:
i- i-
National security; i-
Public security;
i- i-
Defamation;
Copyright information; i-
Sexual harassment;
i-
Los beneficios de comprar resúmenes en Stuvia estan en línea:
Garantiza la calidad de los comentarios
Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!
Compra fácil y rápido
Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.
Enfócate en lo más importante
Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable.
Así llegas a la conclusión rapidamente!
Preguntas frecuentes
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
100% de satisfacción garantizada: ¿Cómo funciona?
Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller AcademiaExpert. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for 12,69 €. You're not tied to anything after your purchase.