• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

FREE AND STUDY GAMES ABOUT CHPT 28 SECURITY

Class notes Jan 11, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

FREE AND STUDY GAMES ABOUT CHPT 28 SECURITY

EXAM QUESTIONS

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -48 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation

Question 1: authorization

Answer:

process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space.

Question 2: elevation of privilege

Answer:

is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system. go from guest to administrative privileges.

Question 3: spyware

Answer:

software that comes hidden in free downloadable software and tracks online movements

Question 4: information secrecy

Answer:

is the category of computer security at addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

Question 5: Packet tampering

Answer:

consists of altering the contents of packets as they travel over the internet or altering data on computer disks after penetrating a network. example attacker might tap a network to intercept packets leaving computer. Attacker could eavesdrop or alter

Question 6: phishing expedition

Answer:

masquerading attack that combines spam with spoofing.

Question 7: digital certificate

Answer:

data file that identifies individuals or organizations online and is comparable to a digital signature.

Question 8: advanced encryption standard (AES)

Answer:

designed to keep government information secure.

Question 9: Splogs (spam blogs)

Answer:

are fake blogs created solely to raise the search engine rank of affiliated websites. using blog to post comment with link to another spam site Question 10: organizations address security risks through two lines of defense: first and second

Answer:

people technology.

Question 11: information security policies

Answer:

identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, change passwords every 30 days

Question 12: cryptography

Answer:

science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.

Question 13: destructive agents

Answer:

malicious agents designed by spammers and other internet attackers to farm email addresses off websites or deposit spyware on machines.

Question 14: certificate authority

Answer:

trusted third party ,such as VERISign that validates user identity by means of digital certificates.

Question 15: Time bombs

Answer:

are computer viruses that wait for a specific date before executing their instructions.

Question 16: firewall

Answer:

hardware and software that guard a private network by analyzing incoming and outgoing information for the correct marking.s

Question 17: public key encryption

Answer:

uses two keys a public key that everyone can have and a private key for only the recipient.

Question 18: black hat hackers

Answer:

break into other people's computer systems and may just look around or may steal and or destroy information.

Question 19: public key encryption (PKE)

Answer:

uses two keys: a public key that everyone can have and a private key for only the recipient. public key to all users to send info private key to receiver.

Question 20: zombie farm

Answer:

group of computers on which a hacker has planted zombie programs.

Question 21: hactivists

Answer:

have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

Question 22: worm

Answer:

spreads itself not only from file to file but also computer to computer

Question 23: Hoaxes

Answer:

attack computer systems by transmitting a virus hoax, with a real virus attached. By masking the attack in a seemingly legitimate message unsuspecting users send the message to others infecting many users along the way

Question 24: spyware

Answer:

is a special class of adware that collects data about the user ad transmits it over the internet without user's knowledge or permission

Question 25: decrpt

Answer:

information is to decode it and is the opposite of encrypt.

Question 26: crackers

Answer:

have criminal intent when hacking

Question 27: sniffer

Answer:

program or device that can monitor data traveling over a network. Sniffers can show all the data being transmitted over a network, ....passwords and sensitive info. Tend to be favorite of hackers

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

PDF Download FREE AND STUDY GAMES ABOUT CHPT 28 SECURITY EXAM QUESTIONS Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -48 Questions and Answers -format ...

UNLOCK ACCESS $11.99