CYSE 101
Western Governors University
All 4 results
Sort by
-
Bundle for CYSE Tests Compilation | Updated
- Package deal • 4 items • 2022
-
- $14.49
- + learn more
Bundle for CYSE Tests Compilation | Updated
-
CYSE 101 Final Exam Jones | 60 Questions with 100% Correct Answers
- Exam (elaborations) • 5 pages • 2022
- Available in package deal
-
- $5.49
- + learn more
How does the principle of least privilege apply to operating system hardening? - 
prevents attack actions that require administrator or root privilege 
What is the difference between a port scanner and a vulnerability assessment tool? - 
port scanners discover listening ports; vulnerability assessment tools report known 
vulnerabilities on listening ports 
What does applying a vendor OS update (patch) usually do? - 
What does executable space protection do for us and how? - prevents buffer 
ove...
-
CYSE 101 FINAL REVIEW | with COMPLETE SOLUTION
- Exam (elaborations) • 6 pages • 2022
- Available in package deal
-
- $6.49
- + learn more
What Kismet used for? - Finding wireless access points even when attempts have 
made it difficult to do so. 
What is the concept of network segmentation and why do it? - Divide networks into 
subnets. 
Do this for controlling network traffic. 
Boost Performance. 
Troubleshooting network issues. 
Why is a BYOD policy bad for an enterprise network? - Potential for malware to be 
brought into the network from outside sources is high. Rogue access points. 
Three main protocols of wire encryption? - ...
-
CYSE 101 FINAL STUDY SET with COMPLETE SOLUTION | 275 Questions with 100% Correct Answers [BEST]
- Exam (elaborations) • 52 pages • 2022
- Available in package deal
-
- $12.49
- + learn more
What is access control? - A security technique that regulates who or what can view 
or use resources in a computing environment 
It enables administrators to manage access at a more granular level 
Authentication - Authentication is the step after identification 
It is to determine whether the claim of the identity is true 
Because access control is typically based on the identity of the user who requests 
access to a resource, authentication is essential to effective security. 
What is the role...
As you read this, a fellow student has made another $4.70
How did he do that? By selling his study resources on Stuvia. Try it yourself! Discover all about earning on Stuvia