IT 105 Final GMU Exam wit 100% Correct Answers | 2024/2025 Update
1 view 0 purchase
Course
IT courses
Institution
IT Courses
IT 105 Final GMU Exam wit 100% Correct
Answers | 2024/2025 Update
A self-replicating/distributing and self-propagating malware that is a
standalone executable program that carries out unauthorized activity on a
victim's device - worms
A node/bridge on a network that serves as a portal to other...
A self-replicating/distributing and self-propagating malware that is a
standalone executable program that carries out unauthorized activity on a
victim's device - ✔✔worms
A node/bridge on a network that serves as a portal to other networks. -
✔✔gateway
This malware self-replicates itself on the host device, and it can't spread
itself from one device to another. They spread via exchanging infected files.
- ✔✔virus
It's main purpose is to disguise malware as legitimate software. It can't
spread itself to other devices and it CANT SELF-REPLICATE. - ✔✔Trojan
a device or software that is designed to block unauthorized access while
allowing authorized communications - ✔✔firewall
device that connects networks and allows devices to communicate with
each other within those networks - ✔✔Router
A device that allows computers to connect to the internet - ✔✔Modem
, This transport protocol is connection based and connection must be
established prior to actual data transfer occurring - ✔✔TCP (Transmission
Control Protocol)
This transport protocol is in connectionless and transmission occurs on a
best-effort basis, with an acknowledgment flowing back only after
transmission was initiated - ✔✔UDP (User Datagram Protocol)
the method of transmitting the bits one after another along a single path. It
is slow, cost-effective, has relatively few errors, and is practical for long
distances. - ✔✔Serial transmission
the method of transmitting a group of bits at a single instant in time, which
requires multiple paths. It is fast (higher data transfer rate) but expensive,
and it is practical only for short distances. - ✔✔Parallel transmission
This refers to any computer program designed to surreptitiously (secretly)
enter a digital device. - ✔✔Malware
The action carried out by malware code is referred to as a - ✔✔Payload
this encryption function involve the use of one key - ✔✔Private-key
this encryption function involve the use of two keys - ✔✔Public-key
True/False: A basic computer network can be described as two or more
computers that are linked together - ✔✔True
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller JOSHCLAY. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.