100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
BTE 210 Final Exam Questions And Correct Answers $9.99   Add to cart

Exam (elaborations)

BTE 210 Final Exam Questions And Correct Answers

 7 views  0 purchase
  • Course
  • BTE 210
  • Institution
  • BTE 210

BTE 210 Final Exam Questions And Correct Answers...

Preview 4 out of 31  pages

  • October 17, 2024
  • 31
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • BTE 210
  • BTE 210
avatar-seller
Easton
BTE 210 Final Exam Questions And Correct Answers


security - ANSWER The level of protection from crime, harm, injury and/or loss



information security - ANSWER Protecting organization's information-related resources
against unauthorized access, use, disclosure, disruption, modification, or destruction



threat - ANSWER any potential danger to which a system may be exposed



exposure - ANSWER the potential harm, loss or damage that could result if a threat
exploits that resource



vulnerability - ANSWER the possibility that the system will suffer harm by a threat



unintentional threats to IS - ANSWER - human errors



- social engineering



human errors - ANSWER higher level employees + greater access = greater threat



human error areas - ANSWER - human resources



- information systems



- contract labor, consultants, janitors, and guards

,social engineering - ANSWER attack where perpetrator uses social skills to trick or
manipulate employees for confidential information



Espionage - ANSWER individual attempts to gain illegal access to organizational
information



Information extortion - ANSWER attacker demands money for



- not stealing info



- giving back info



- not to disclose stolen info



sabotage - ANSWER intruder maliciously alters a web page by inserting or substituting
provocative and frequently offending data



theft - ANSWER smaller equipment are easier to steal



larger storage means more information lost



dumpster diving-ANSWER rummaging through trash in search of discarded information



identity theft-ANSWER assuming the identity of another person in order to access
financial information, or to frame a person of a crime



phishing-ANSWER masquerading as a trusted organization in an electronic
communication

,intellectual property-ANSWER property made by an individual or corporation



trade secret-ANSWER secret of a company, not public information



patent-ANSWER protect an invention or process for 20 years



copyright - ANSWER protects ownership of the property for the life of the creator



user action - ANSWER - virus

- worm

- phishing attack

- spear phishing attack



without user action - ANSWER - denial of service

- distrubuted DoS attack



attack by programmers - ANSWER - trojan horse

- back door

- logic bomb



virus - ANSWER attack by a host computer



worm - ANSWER can spread by itself



spear phishing - ANSWER phishing attack on a specific target



Dos - ANSWER Bombard and crash a target computer with bogus requests

, distributed dos attack - ANSWER Using the hacked computers to perform Dos-attack

trojan horse - ANSWER Disguised as an innocent program

back door - ANSWER A secret entrance that allows for unauthorized access to the
program or system bypassing all security

logic bomb - ANSWER Dormant and only activates at a specified date and time



Alien software - ANSWER programs that are installed on a computer without the
knowledge or consent of user.



alien software - ANSWER

adware

spyware

spamware

cookies



adware - ANSWER pop-up advertisements appear across computer screens.



spyware - ANSWER it keeps track of users' personal information sans latter's
knowledge or permission.



spamware - ANSWER A launchpad is created from which spam emails are sent out.



cookies - ANSWER Small files stored in a computer with detailed information regarding
visited websites



scada (supervisor control and data acquisition) - ANSWER systems control chemical,
physical, or transport processes

cyberterrorism - ANSWER attack via the internet to use a target's computer systems to
cause physical, real world harm

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Easton. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79079 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart