ISTM 210 Final Exam With Solutions 100%
Correct
any communications in or out of an intranet pass through a special security computer called a
______________ as a precaution to protect from any external threats proxy server
port used to contain and delay structural fire from spreading to conti...
any communications in or out of an intranet pass through a special security computer called a
______________ as a precaution to protect from any external threats proxy server
port used to contain and delay structural fire from spreading to contiguous buildings
standard security practices dictate a __________ firewall rule set in that the only network
connections that are permitted are the ones that have been explicitly allowed default-deny
default-allow rule set in that all traffic is allowed unless it has been specifically blocked
computer viruses computer files that reproduce by making copies of them within a
computer's memory, storage, or on a network
metamorphic virus Are viruses can alter how the appear and known to avoid detection.
malware programs specifically intended to penetrate or damage a computer system
without the end user's knowledge
, ISTM 210 Final Exam With Solutions 100%
Correct
experimental malware written as research project to further understand how to combat
them
worms self-replicating but can be potentially more insidious in that is does not need to
attach itself to an existing program to spread
Trojan horses program that often seems harmless and interesting at fist until it is executed
spyware program that is installed covertly on a computer to capture or take control of the
system without the user's knowledge or consent
adware also called advertising-supported software, programs that automatically display or
download advertising to a computer
spamming also called junk email, abuse of an email system to arbitrarily send millions of
on solicited bulk messages
, ISTM 210 Final Exam With Solutions 100%
Correct
denial of service attack DoS for short, attempt to make a a computer or any of its
resources unavailable to its intended users
reverse phishing/keylogging when a perpetrator logs onto a computer workstation and
installs a program that simply records every keystroke made at the workstation's keyboard
antivirus software computer programs that attempt to identify, prevent, and eliminate
computer viruses and malware
two popular antivirus programs are Symantec Corporation's Norton Antivirus and
McAfee's VirusScan
system patches updates sent out to fix security threats in the operating system
strong passwords longer in length than ordinary passwords, typically 8-12 characters
passphrase memorable strong password
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller UpperClass. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $19.99. You're not tied to anything after your purchase.