100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

ALL ICTL EXAM QUESTIONS AND WELL ELABORATED SOLUTIONS

Puntuación
-
Vendido
-
Páginas
143
Grado
A+
Subido en
10-12-2024
Escrito en
2024/2025

ALL ICTL EXAM QUESTIONS AND WELL ELABORATED SOLUTIONS Computer Software - ANSWER -a set of instructions that directs the computer in how to complete a task Methods used to ensure high availability - ANSWER -- eliminate single points of failure - design for reliability - detect failures as they occur convergence - ANSWER -The use of data networks to carry voice (or telephone), video, and other communications services in addition to data. According to DoD 8570.01-M, the IA (Information Assurance) technical category consists of how many levels? - ANSWER -I, II, & III ICMP (Internet Control Message Protocol) - ANSWER -Used by a router to exchange information with other routers MD5 algorithm - ANSWER -a hash function developed by Ron Rivest that produces a 128-bit hash value Unix is: - ANSWER -- A trademark - An operating system An internet - ANSWER -a network of computer networks data packet - ANSWER -A discrete unit of information sent from one node on a network to another. Linux is written in: - ANSWER -C Which tool would be most effective for mapping a target network? - ANSWER - Vulnerability scanner Configuration Management - ANSWER -The process of keeping track of changes to the system, if needed, approving them. Boolean Search - ANSWER -uses logical operators such as AND, OR, and NOT to link the words you are searching for Switch - ANSWER -Use the SWITCH statement when many blocks of code are being executed. file server - ANSWER -A specialized server that enables clients to share applications and data across the network. Source code refers to: - ANSWER -A human readable version of computer software Packet Sniffer - ANSWER -A device or program that monitors the data traveling between computers on a network Confidentiality - ANSWER -prevents the disclosure of information to unauthorized people, resources and processes Loops - ANSWER -Use when running the same code over and over again, each time with a different value. What is the best protection method for sharing Personally Identifiable Information (PII)? - ANSWER -Digitally sign and encrypt the email. HMAC (Hash-based Message Authentication Code) - ANSWER -they strengthens hashing algorithms by using an additional secret key as input to the hash function host - ANSWER -A computer that enables resource sharing by other computers on the same network Public Domain - ANSWER -works that are not restricted by copyright; they are owned by the public and can be freely used Ransomware - ANSWER -holds a computer system or the data it contains captive until the target makes a payment Internet Service Providers - ANSWER -provide an access path to the Internet Methods used to ensure confidentiality - ANSWER -data encryption, authentication, and access control. 3DES (Triple Data Encryption Algorithm) - ANSWER -a symmetric block cipher with 64-bit block size that uses a 56-bit key, encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits Script Kiddies - ANSWER -teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks. Most of the tools that are part of Linux systems come from: - ANSWER -The GNU (GNU's Not Unix!) project While Loop - ANSWER -loops through a block of code while a specified condition is true Vulnerability Brokers - ANSWER -grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards Having reviewed DoD Wireless STIG (Ver6, Release 1), Sarah learns she may only utilize SecNet 54 and ______________ for transmitting classified information up to Top Secret. - ANSWER -KOV-26 Talon Risk Analysis - ANSWER -The process of identifying security risks, determining their magnitude, and identifying areas needing safeguard

Mostrar más Leer menos
Institución
ALL ICTL
Grado
ALL ICTL











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
ALL ICTL
Grado
ALL ICTL

Información del documento

Subido en
10 de diciembre de 2024
Número de páginas
143
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

ALL ICTL EXAM QUESTIONS AND WELL
ELABORATED SOLUTIONS
Computer Software - ANSWER -a set of instructions that directs the computer in
how to complete a task

Methods used to ensure high availability - ANSWER -- eliminate single points of
failure
- design for reliability
- detect failures as they occur

convergence - ANSWER -The use of data networks to carry voice (or telephone),
video, and other communications services in addition to data.

According to DoD 8570.01-M, the IA (Information Assurance) technical category
consists of how many levels? - ANSWER -I, II, & III

ICMP (Internet Control Message Protocol) - ANSWER -Used by a router to
exchange information with other routers

MD5 algorithm - ANSWER -a hash function developed by Ron Rivest that
produces a 128-bit hash value

Unix is: - ANSWER -- A trademark
- An operating system

An internet - ANSWER -a network of computer networks

data packet - ANSWER -A discrete unit of information sent from one node on a
network to another.

Linux is written in: - ANSWER -C

,Which tool would be most effective for mapping a target network? - ANSWER -
Vulnerability scanner

Configuration Management - ANSWER -The process of keeping track of changes
to the system, if needed, approving them.

Boolean Search - ANSWER -uses logical operators such as AND, OR, and NOT
to link the words you are searching for

Switch - ANSWER -Use the SWITCH statement when many blocks of code are
being executed.

file server - ANSWER -A specialized server that enables clients to share
applications and data across
the network.

Source code refers to: - ANSWER -A human readable version of computer
software

Packet Sniffer - ANSWER -A device or program that monitors the data traveling
between computers on a network

Confidentiality - ANSWER -prevents the disclosure of information to
unauthorized people, resources and processes

Loops - ANSWER -Use when running the same code over and over again, each
time with a different value.

What is the best protection method for sharing Personally Identifiable Information
(PII)? - ANSWER -Digitally sign and encrypt the email.

HMAC (Hash-based Message Authentication Code) - ANSWER -they strengthens
hashing algorithms by using an additional secret key as input to the hash function

, host - ANSWER -A computer that enables resource sharing by other computers on
the same network

Public Domain - ANSWER -works that are not restricted by copyright; they are
owned by the public and can be freely used

Ransomware - ANSWER -holds a computer system or the data it contains captive
until the target makes a payment

Internet Service Providers - ANSWER -provide an access path to the Internet

Methods used to ensure confidentiality - ANSWER -data encryption,
authentication, and access control.

3DES (Triple Data Encryption Algorithm) - ANSWER -a symmetric block cipher
with 64-bit block size that uses a 56-bit key, encrypts data three times and uses a
different key for at least one of the three passes, giving it a cumulative key size of
112-168 bits

Script Kiddies - ANSWER -teenagers or hobbyists mostly limited to pranks
and vandalism, have little or no skill, often using existing tools or instructions
found on the Internet to launch attacks.

Most of the tools that are part of Linux systems come from: - ANSWER -The
GNU (GNU's Not Unix!) project

While Loop - ANSWER -loops through a block of code while a specified
condition is true

Vulnerability Brokers - ANSWER -grey hat hackers who attempt to discover
exploits and report them to vendors, sometimes for prizes or rewards

Having reviewed DoD Wireless STIG (Ver6, Release 1), Sarah learns she may
only utilize SecNet 54 and ______________ for transmitting classified information
up to Top Secret. - ANSWER -KOV-26 Talon

, Risk Analysis - ANSWER -The process of identifying security risks, determining
their magnitude, and identifying areas needing safeguards

Digital certificate - ANSWER -it enable users, hosts, and organizations to
exchange information securely over the Internet

The Linux platform that runs on mobile phones is called: - ANSWER -Android

3D Spreadsheets - ANSWER -enable you to link multiple worksheets together

Authorization - ANSWER -services that determine which
resources users can access, along with the operations that users can perform, after
the user is granted access once authentication is complete

Hacktivists - ANSWER -grey hat hackers who rally and protest against
different political and social ideas

What does a distribution provide to add and remove software from the system? -
ANSWER -Package manager

Antivirus software installed to scan and monitor malware activities on a server or
workstation would be identified as a __________ based intrusion
detection/prevention system. - ANSWER -Host

license tracking - ANSWER -The process of determining the number of copies of
a single application that are currently in use on the network and whether the
number in use exceeds the authorized number of licenses

load balancing - ANSWER -The process of distributing data transfer activity
evenly across a network so that no single device is overwhelmed.

Which of the following is true of Internet hoaxes? - ANSWER -They can be part
of a distributed denial-of-service (DDoS) attack.
$11.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
TheExamMaestro Teachme2-tutor
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
115
Miembro desde
1 año
Número de seguidores
5
Documentos
3063
Última venta
1 semana hace
Exam Vault

Exam Vault is your trusted destination for high-quality exam materials and study resources. We provide a wide rage of tests and prep guides to help you succeed, whether you're preparing for academic exams, certifications, or professional assessments

3.8

13 reseñas

5
7
4
2
3
1
2
0
1
3

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes