CTSP EXAM QUESTIONS AND
ANSWERS 100% GRADED
Malware - ANSWER software designed to infiltrate a computer system and
possibly damage it without the user's knowledge or consent
Virus - ANSWER code that runs on a computer without the user's knowledge; it
infects the computer when th...
Malware - ANSWER software designed to infiltrate a computer system and
possibly damage it without the user's knowledge or consent
Virus - ANSWER code that runs on a computer without the user's knowledge; it
infects the computer when the code is accessed and executed (love bug virus)
Worm - ANSWER like a virus except that it self-replicates, whereas a virus does
not (nimda, propagated through network shares and mass e-mailing)
Trojan Horse - ANSWER appear to perform desirable functions but are actually
performing malicious functions behind the scenes (remote access trojan, plugx)
Remote Access Trojan (RAT) - ANSWER their capability to allow an attacker
higher administration privileges than those of the owner of the system makes them
quite dangerous; most common type of Trojan
Ransomware - ANSWER a type of malware that restricts access to a computer
system and demands that a ransom be paid; also known as crypto-malware, it
encrypts files and/or locks the system (often propagated via a trojan, cryptolocker)
Spyware - ANSWER malicious software either downloaded unwittingly from a
website or installed along with some other third-party software; usually collects
information without the user's consent (internet optimizer - dyfuca)
Adware - ANSWER usually falls into the realm of spyware because it pops up
advertisements based on what it has learned from spying on the user
Grayware - ANSWER describes applications that are behaving improperly but
without serious consequences
Rootkit - ANSWER a type of software designed to gain administrator-level
control over a computer system without being detected (boot loader rootkits, evil
maid attack, alureon)
, Spam - ANSWER the abuse of electronic messaging systems such as e-mail,
texting, social media, broadcast media, instant messaging, and so on (identity theft
e-mails [phishing], lottery scam e-mails)
Threat Vector - ANSWER the method that a threat uses to access a target is
known
Attack Vector - ANSWER the means by which an attacker gains access to a
computer in order to deliver malicious software; most common is via software
Mirepoix - ANSWER Roughly cut pieces
Macedoine - ANSWER Dice
Jaredinere - ANSWER Batons
Julienne - ANSWER Thin strips
Paysanne - ANSWER Thin, flat cuts of triangles, squares or rounds
Brunoise - ANSWER Very fine dice
Peel - ANSWER Remove skins from fruit or vegetables
Skin - ANSWER Remove skin for poultry, meat or fish
Chop - ANSWER Cut food into pieces
Slice - ANSWER Cut into thin pieces the width of the food
Dice - ANSWER Cut into cubes
Chiffonade - ANSWER Thinly shredded foods
Segment - ANSWER Citrus fruit removed from the membrane and skin
Blanche 1 - ANSWER To cook food lightly in boiling water then plunge into cold
water to retain colour
Blanche 2 - ANSWER To plunge veg or fruit into boiling water then refreshed to
allow peel to be removed
, Blanche 3 - ANSWER To place food in cold water, bring to boil to whiten (meats)
Blanche 4 - ANSWER Cooking of potatoes in a deep fat fryer until soft but not
coloured
Blanche 5 - ANSWER To cook lightly to render limp (leaves)
Concasse - ANSWER Coarsely chopped
Pureé - ANSWER Cook fruits/vegetables , soups etc. passed through a sieve or
processed using a hand blender
Marinate - ANSWER Meats/vegetables/fruits soaked in a flavoursome mixture to
enhance taste before cooking
Strain - ANSWER To separate liquid from the solid by passing through a sieve or
strainer
pass - ANSWER To cause food to go through a sieve
Grate - ANSWER To shred food into small pieces
coat - ANSWER To add a thin layer of flor, oatmeal etc to delicate foods before
frying
Pane - ANSWER Food is coated in flour, egg then breadcrumbs or another
suitable coating
Mix - ANSWER Combine ingredients
Blend - ANSWER To mix together dry ingredients with a liquid to make a paste
Whisk - ANSWER Vigorous beating of ingredients such as eggs to increase
volume
Typosquatting - ANSWER when a user is attempting to access a website but types
the incorrect domain name by mistake and the user is redirected to an altogether
unwanted website that's malicious in nature
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller SmartscoreAaron. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $15.99. You're not tied to anything after your purchase.