Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Cyber Security Exam

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
05-04-2024
Written in
2023/2024

Cyber Security Exam Instant Message Common communication using a computer ICMP Internet Control Message Protocol. Used by a router to exchange information with other routers Configuration Management The process of keeping track of changes to the system, if needed, approving them. Packet Sniffer A device or program that monitors the data traveling between computers on a network Gateway A bridge two networks Keywords will block any website that to deal with certain predetermined keywords Risk Analysis The process of identifying security risks, determining their magnitude, and identifying areas needing safeguards Packet Filtering or Packet Purity analyzed against a set of filters. That make it through the filters are sent to the requesting system and others are discarded Telnet used to perform commands on a remote computers Spyware any software using someone's Internet connection in the background without their knowledge or explicit permission. These applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that majority of shareware and freeware do not come with this. Once installed, this monitors user activity on the Internet and transmits that information in the background to someone else. IT can also gather information about e-mail addresses and even passwords and credit card numbers. SMTP Session Hijacking by gaining access to a list of e-mail addresses a person can send spam to thousands of users Distributed Tool A tool that can be distributed to multiple hosts, which can then be coordinated to anonymously perform an attack on the target host simultaneously after some time delay

Show more Read less
Institution
Course

Content preview

Cyber Security Exam
Instant Message
Common communication using a computer


ICMP
Internet Control Message Protocol. Used by a router to exchange information with other routers


Configuration Management
The process of keeping track of changes to the system, if needed, approving them.


Packet Sniffer
A device or program that monitors the data traveling between computers on a network


Gateway
A bridge two networks


Keywords
will block any website that to deal with certain predetermined keywords


Risk Analysis
The process of identifying security risks, determining their magnitude, and identifying areas needing
safeguards


Packet Filtering or Packet Purity
analyzed against a set of filters. That make it through the filters are sent to the requesting system and
others are discarded


Telnet
used to perform commands on a remote computers


Spyware
any software using someone's Internet connection in the background without their knowledge or
explicit permission. These applications are typically bundled as a hidden component of freeware or
shareware programs that can be downloaded from the Internet; however, it should be noted that
majority of shareware and freeware do not come with this. Once installed, this monitors user activity
on the Internet and transmits that information in the background to someone else. IT can also gather
information about e-mail addresses and even passwords and credit card numbers.


SMTP Session Hijacking
by gaining access to a list of e-mail addresses a person can send spam to thousands of users


Distributed Tool
A tool that can be distributed to multiple hosts, which can then be coordinated to anonymously
perform an attack on the target host simultaneously after some time delay

, Operation Controls
Security methods that focus on mechanisms that primarily are implemented and executed by people
(as opposed to systems)


Encryptions
the translation of data into a secret code; the most effective way to achieve data security. To read
these files, you must have access to a secret key or password that enables you to decrypt it


Audit Trail
A record showing who has accessed a computer system and what operations he or she has performed
during a given period of time. Useful both for maintaining security and for recovering lost transactions


Mobile Code
Software moduels obtained from remote systems, transferred across a network, and then
downloaded and executed on a local system without explicit installation or execution by the recipient,
Malicious types of this are designed, employed, distributed, or activated with the intention of
compromising the performance or security of information systems and computers, increasing access
to those systems disclosing unauthorized information, corrupting information, denying service, or
stealing resources.


Data Integrity
The state that exists when automated data is the same as that in source documents, or has been
correctly computed from source data, and has not been exposed to alteration or destruction


Digital Signature
A way to verify that an email message is really from the person who supposedly sent it and that it
hasn't been changed. You may have received emails that have a block of letters and numbers at the
bottom of the message - this mathematical algorithm is used to combine the information in the
message. The result is a random-looking string of letters and numbers.


Dictionary Attack
An attack that uses a brute-force technique of successively trying all the words in some large,
exhaustive list


SNMP
Simple Network Management Protocol. Used to collect system information from a remote computer


EULA
A contract between you and the software's vendor or developer. Some software packages state that
you agree to the contract by removing the shrink-wrap on the package. However, you may be more
familiar with the type of this that is presented as a dialog box that appears the first time you open the
software. It usually requires you to accept the conditions of the contract before you can proceed


Backup
A copy of data and/or applications contained in the IT stored on magnetic media outside of the IT to
be used in the event IT data are lost.

Written for

Course

Document information

Uploaded on
April 5, 2024
Number of pages
9
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LectDeniz Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
21
Member since
2 year
Number of followers
13
Documents
4902
Last sold
6 months ago
Lect Deniz Academic Resources Hub

Lect Aziim is a highly experienced academic tutor and dedicated content creator with a strong track record of developing comprehensive, high-quality study materials for a wide range of university courses across the globe. With years of experience in higher education support, he excels at transforming complex academic concepts into clear, structured, and easy-to-follow resources that enhance student understanding and confidence. He provides an extensive collection of well-researched and carefully organized documents across key disciplines, including nursing, medicine, and various science fields. His materials cover essential topics such as anatomy, physiology, pharmacology, clinical practice, and core scientific principles, making them highly valuable for both coursework and intensive exam preparation. Each document is thoughtfully designed to align with university standards and curricula, ensuring accuracy, relevance, and practical application. Lect Aziim’s work stands out for its clarity, depth, and attention to detail, offering students concise summaries, detailed explanations, and exam-focused content that supports effective revision. His commitment to academic excellence and student success is reflected in the consistency and reliability of his materials, making him a trusted resource for learners seeking to improve performance and achieve their academic goals.

Read more Read less
5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions