Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CIST 2311 Final Exam study guide-CIST 2311 Visual Basics West Georgia Technical College., Verified And Correct Answers, Secure HIGHSCORE

Rating
-
Sold
-
Pages
116
Grade
A+
Uploaded on
27-04-2021
Written in
2020/2021

CIST 2311 Final Exam study guide-CIST 2311 Visual Basics West Georgia Technical College., Verified And Correct Answers, Secure HIGHSCORE

Institution
Course

Content preview

CIST Final Exam Question Answers

 Question 1
4 out of 4 points
A Trojan horse is a malicious program that tricks users into running it
—often through social engineering.
Selected Tru
Answer: e
Answers: Tru
e
False
 Question 2
4 out of 4 points
A backdoor is a program that allows unauthorized access.
Selected Tru
Answer: e
Answers: Tru
e
False
 Question 3
4 out of 4 points
A computer environment is also referred to as IT Infrastructure.
Selected Tru
Answer: e
Answers: Tru
e
False
 Question 4
4 out of 4 points
A device (such as a fence, door, lock, or fire extinguisher) that limits
access or otherwise protects a resource is a:
Selected
Answer:
physical
control.
Answers: preventive
control.
detective
control.

, physical
control.
corrective
control.
 Question 5
4 out of 4 points
A device or process (such as user authentication, antivirus software,
and firewalls) that limits access to a resource is referred to as a:
Selected
Answer: technical
control.
Answers: preventive
control.
physical
control.
detective
control.

technical
control.
 Question 6
4 out of 4 points
A threat is any action that could lead to damage or loss.
Selected Tru
Answer: e
Answers: Tru
e
False
 Question 7
4 out of 4 points
An attacker is any person or program that attempts to interact with a
computer information system in an unauthorized manner.
Selected Tru
Answer: e
Answers: Tru
e
False
 Question 8
4 out of 4 points
Any action that could lead to damage or loss is referred to as a:
Selected

, Answers: vulnerabilit
y.
weakness.
risk.

threat.
 Question 9
4 out of 4 points
Controls (such as locked doors, firewall rules, and user passwords)
that stop an action before it occurs are referred to as:
Selected
Answer: preventive
controls.
Answers: logical controls.

preventive
controls.
physical
controls.
detective
controls.
 Question 10
4 out of 4 points
Hacktivists are hackers who are motivated by monetary gain and use
hacking skills to enhance their financial position.
Selected Fals
Answer: e
Answers: True
Fals
e
 Question 11
4 out of 4 points
In the analysis step of the process for addressing attacks, all abnormal
activity or suspect activity is bad.
Selected Fals
Answer: e
Answers: True
Fals
e
 Question 12
4 out of 4 points

, Integrity means the assurance that information can be accessed and
viewed only by authorized users.
Selected Fals
Answer: e
Answers: True
Fals
e
 Question 13
4 out of 4 points
Malicious software is software that is designed to infiltrate a target
computer and make it do something the attacker has instructed it to
do.
Selected Tru
Answer: e
Answers: Tru
e
False
 Question 14
4 out of 4 points
Microsoft recommends not using security patches on infected systems
after worm removal.
Selected Fals
Answer: e
Answers: True
Fals
e
 Question 15
4 out of 4 points
Security controls are methods and mechanisms used to disseminate
information.
Selected Fals
Answer: e
Answers: True
Fals
e
 Question 16
4 out of 4 points
Smoke detectors, log monitors, and system audits are examples of:
Selected
Answer:
detective
controls.
Answers: corrective
controls.

Written for

Course

Document information

Uploaded on
April 27, 2021
Number of pages
116
Written in
2020/2021
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
HIGHSCORE Masters
Follow You need to be logged in order to follow users or courses
Sold
1511
Member since
6 year
Number of followers
1280
Documents
2038
Last sold
2 months ago

3.8

264 reviews

5
129
4
57
3
23
2
18
1
37

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions