100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

All ICTL Complete Questions with Answers 100% Correct

Rating
4.5
(2)
Sold
6
Pages
105
Grade
A+
Uploaded on
26-04-2024
Written in
2023/2024

All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct All ICTL Complete Questions with Answers 100% Correct

Show more Read less
Institution
ICTL
Course
ICTL











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ICTL
Course
ICTL

Document information

Uploaded on
April 26, 2024
Number of pages
105
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • all ictl
  • ictl

Content preview

All ICTL Complete Questions with
Answers 100% Correct
Hashing algorithm ✔✔ - a tool that ensures data integrity by taking binary data and
producing a fixed-length representation called the hash value or message digest

backbone ✔✔ - The part of a network to which segments and significant shared
devices (such as routers, switches, and servers) connect.

The implementation of an IA operational baseline will be an incremental process of
doing what? ✔✔ - Protecting critical assets

One of the jobs of the kernel is to: ✔✔ - - Manage the system's resources

Five nines ✔✔ - when the system and services are available 99,999% of the time

Antivirus protection ✔✔ - antimalware program that continuously monitors for viruses

Cryptology ✔✔ - the study of codes, or the art of writing and solving them

Computer Software ✔✔ - a set of instructions that directs the computer in how to
complete a task

Methods used to ensure high availability ✔✔ - - eliminate single points of failure
- design for reliability
- detect failures as they occur

convergence ✔✔ - The use of data networks to carry voice (or telephone), video, and
other communications services in addition to data.

According to DoD 8570.01-M, the IA (Information Assurance) technical category
consists of how many levels? ✔✔ - I, II, & III

ICMP (Internet Control Message Protocol) ✔✔ - Used by a router to exchange
information with other routers

MD5 algorithm ✔✔ - a hash function developed by Ron Rivest that produces a 128-bit
hash value

Unix is: ✔✔ - - A trademark
- An operating system

An internet ✔✔ - a network of computer networks

,data packet ✔✔ - A discrete unit of information sent from one node on a network to
another.

Linux is written in: ✔✔ - C

Which tool would be most effective for mapping a target network? ✔✔ - Vulnerability
scanner

Configuration Management ✔✔ - The process of keeping track of changes to the
system, if needed, approving them.

Boolean Search ✔✔ - uses logical operators such as AND, OR, and NOT to link the
words you are searching for

Switch ✔✔ - Use the SWITCH statement when many blocks of code are being
executed.

file server ✔✔ - A specialized server that enables clients to share applications and data
across
the network.

Source code refers to: ✔✔ - A human readable version of computer software

Packet Sniffer ✔✔ - A device or program that monitors the data traveling between
computers on a network

Confidentiality ✔✔ - prevents the disclosure of information to
unauthorized people, resources and processes

Loops ✔✔ - Use when running the same code over and over again, each time with a
different value.

What is the best protection method for sharing Personally Identifiable Information (PII)?
✔✔ - Digitally sign and encrypt the email.

HMAC (Hash-based Message Authentication Code) ✔✔ - they strengthens hashing
algorithms by using an additional secret key as input to the hash function

host ✔✔ - A computer that enables resource sharing by other computers on the same
network

Public Domain ✔✔ - works that are not restricted by copyright; they are owned by the
public and can be freely used

,Ransomware ✔✔ - holds a computer system or the data it contains captive until the
target makes a payment

Internet Service Providers ✔✔ - provide an access path to the Internet

Methods used to ensure confidentiality ✔✔ - data encryption, authentication, and
access control.

3DES (Triple Data Encryption Algorithm) ✔✔ - a symmetric block cipher with 64-bit
block size that uses a 56-bit key, encrypts data three times and uses a different key for
at least one of the three passes, giving it a cumulative key size of 112-168 bits

Script Kiddies ✔✔ - teenagers or hobbyists mostly limited to pranks
and vandalism, have little or no skill, often using existing tools or instructions found on
the Internet to launch attacks.

Most of the tools that are part of Linux systems come from: ✔✔ - The GNU (GNU's Not
Unix!) project

While Loop ✔✔ - loops through a block of code while a specified condition is true

Vulnerability Brokers ✔✔ - grey hat hackers who attempt to discover
exploits and report them to vendors, sometimes for prizes or rewards

Having reviewed DoD Wireless STIG (Ver6, Release 1), Sarah learns she may only
utilize SecNet 54 and ______________ for transmitting classified information up to Top
Secret. ✔✔ - KOV-26 Talon

Risk Analysis ✔✔ - The process of identifying security risks, determining their
magnitude, and identifying areas needing safeguards

Digital certificate ✔✔ - it enable users, hosts, and organizations to exchange
information securely over the Internet

The Linux platform that runs on mobile phones is called: ✔✔ - Android

3D Spreadsheets ✔✔ - enable you to link multiple worksheets together

Authorization ✔✔ - services that determine which
resources users can access, along with the operations that users can perform, after the
user is granted access once authentication is complete

Hacktivists ✔✔ - grey hat hackers who rally and protest against
different political and social ideas

, What does a distribution provide to add and remove software from the system? ✔✔ -
Package manager

Antivirus software installed to scan and monitor malware activities on a server or
workstation would be identified as a __________ based intrusion detection/prevention
system. ✔✔ - Host

license tracking ✔✔ - The process of determining the number of copies of a single
application that are currently in use on the network and whether the number in use
exceeds the authorized number of licenses

load balancing ✔✔ - The process of distributing data transfer activity evenly across a
network so that no single device is overwhelmed.

Which of the following is true of Internet hoaxes? ✔✔ - They can be part of a
distributed denial-of-service (DDoS) attack.

The bootloader's job is to: ✔✔ - Load the kernel after the computer is powered on

Entity integrity ✔✔ - a database integrity that state that all rows must have a unique
identifier called a primary key

File access control ✔✔ - consists of permissions that limit folder or file access for an
individual or for a group of users

Add-On ✔✔ - is specific to a type of browser and adds functionality to the browser

State Sponsored Hackers ✔✔ - depending on a person's perspective, these are either
white hat or black hat hackers who steal government secrets, gather intelligence, and
sabotage networks

Methods used to ensure data integrity ✔✔ - hashing, data validation checks, data
consistency checks, and access controls

System resiliency ✔✔ - capability to maintain availability of data and operational
processing despite attacks or disrupting event

NIC (Network Interface Controller/Card) ✔✔ - A piece of hardware that allows a
computer to connect to a network

Unix was originally invented at: ✔✔ - AT&T Bell Labs

NOS (network operating system) ✔✔ - a specialized operating system for a network
device such as a router, switch or firewall

Reviews from verified buyers

Showing all 2 reviews
9 months ago

1 year ago

4.5

2 reviews

5
1
4
1
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Solution001Master Liberty
View profile
Follow You need to be logged in order to follow users or courses
Sold
142
Member since
4 year
Number of followers
108
Documents
3924
Last sold
2 weeks ago
BEST TESTBANK WOLRD

Welcome to the home of all new and latest updated Test Banks,study Guide And Exams All at affordable prizes . Thank You and all the best as you study

3.7

33 reviews

5
13
4
6
3
9
2
0
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions