Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D385 SOFTWARE SECURITY AND TESTING EXAM LATEST 2024 COMPLETE REAL EXAM QUESTIONS AND CORRECT VERIFIED SOLUTIONS (A NEW UPDATED VERSION) |GUARANTEED PASS A+ (BRAND NEW!!)

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
16-11-2024
Geschreven in
2024/2025

WGU D385 SOFTWARE SECURITY AND TESTING EXAM LATEST 2024 COMPLETE REAL EXAM QUESTIONS AND CORRECT VERIFIED SOLUTIONS (A NEW UPDATED VERSION) |GUARANTEED PASS A+ (BRAND NEW!!)

Instelling
Vak

Voorbeeld van de inhoud

WGU D385 SOFTWARE SECURITY AND TESTING EXAM LATEST
2024 COMPLETE REAL EXAM QUESTIONS AND CORRECT
VERIFIED SOLUTIONS (A NEW UPDATED VERSION) |
GUARANTEED PASS A+ (BRAND NEW!!)
Digital security risk - ANSWER: any event or action that could cause loss of or
damage to computer or mobile device hardware, software, data, information, or
processing capability

Computer crime - ANSWER: any illegal act involving the use of a computer or related
devices generally

cybercrime - ANSWER: online or internet-based illegal acts

crimeware - ANSWER: software used by cybercriminals

hacker - ANSWER: someone who accesses a computer or network illegally

cracker - ANSWER: has the intent of destroying data, stealing information,or other
malicious action

script kiddie - ANSWER: has the same intent as a cracker but does not have the
technical skills and knowledge

cyberextortionist - ANSWER: someone who demands payment to stop an attack on
an organization's technology infrastructure

cyberterrorist - ANSWER: someone who uses the internet or network to destroy or
damage computers for political reasons

malware - ANSWER: programs that act without a users knowledge and deliberately
alter the operations of computers and mobile devices

virus - ANSWER: potentially damaging program that affects, or infects a computer or
mobile device negatively

worm - ANSWER: program that copies itself repeatedly

trojan horse - ANSWER: program that hides within or looks like a legitimate program

rootkit - ANSWER: program that hides within a computer and allows someone from a
remote location to take full control of the computer

spyware - ANSWER: program placed on a computer without the users knowledge
that secretly collects info about the user and then communicates info about the user

, adware - ANSWER: online advertisement in a banner or pop-up window on web ages
email messages, or other internet services

botnet - ANSWER: group of compromised computers or mobile devices connected to
a network such as the internet that are used to attack other networks

zombie - ANSWER: a compromised computer or device

bot - ANSWER: a program that performs a repetitive task

doS attack - ANSWER: an assault whose purpose is to disrupt computer access to an
internet service such as the web or email

back door - ANSWER: a program or set of instructions in a program that allows user
to bypass security control

spoofing - ANSWER: technique intruders use to make their network or internet
transmission appear legitimate to a victim computer

firewall - ANSWER: hardware or software that protects a networks resources from
intrusion by users on another network

personal firewall - ANSWER: software firewall that detects and protects a personal
computer and its data

unauthorized access - ANSWER: the use of a computer without permission

acceptable use policy - ANSWER: outlines the activities for which the computer may
or may not be used

access control - ANSWER: security measure that defines who can access a computer,
when they can access it, and what actions they can take when accessing it

password - ANSWER: private combo of characters associated with the user name

user name - ANSWER: unique combo of characters, such as letters or numbers that
identifies one user

CAPTCHA - ANSWER: displays an image containing a series of distorted characters for
a user to identify and enter in order to verify that user input is from humans

PIN - ANSWER: numeric password

biometric device - ANSWER: authenticates a persons identity by translating a
personal characteristic such as fingerprint into a digital code that is compared with a
digital code in a computer verifying a physical or behavioral characteristic

Gekoppeld boek

Geschreven voor

Vak

Documentinformatie

Geüpload op
16 november 2024
Aantal pagina's
5
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$18.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
THEPROJECTOR

Maak kennis met de verkoper

Seller avatar
THEPROJECTOR Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
7
Lid sinds
1 jaar
Aantal volgers
1
Documenten
1137
Laatst verkocht
1 maand geleden

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen