Page 1 of 230
All ICTL EXAM AND STUDY GUIDE LATEST VERSION
THIS YEAR ALL 450 QUESTIONS AND CORRECT
DETAILED SOLUTIONS
ICTL EXAM
Hashing algorithm - CORRECT ANSWER✔✔a tool that ensures data integrity by taking binary
data and producing a fixed-length representation called the hash value or message digest
Question: backbone - CORRECT ANSWER✔✔The part of a network to which segments and
significant shared devices (such as routers, switches, and servers) connect.
Question: The implementation of an IA operational baseline will be an incremental process of
doing what? - CORRECT ANSWER✔✔Protecting critical assets
Question: One of the jobs of the kernel is to: - CORRECT ANSWER✔✔- Manage the system's
resources
Question: Five nines - CORRECT ANSWER✔✔when the system and services are available
99,999% of the time
Question: Antivirus protection - CORRECT ANSWER✔✔antimalware program that continuously
monitors for viruses
1
SUCCESS!
,Page 2 of 230
Question: Cryptology - CORRECT ANSWER✔✔the study of codes, or the art of writing and
solving them
Question: Computer Software - CORRECT ANSWER✔✔a set of instructions that directs the
computer in how to complete a task
Question: Methods used to ensure high availability - CORRECT ANSWER✔✔- eliminate single
points of failure
- design for reliability
- detect failures as they occur
Question: convergence - CORRECT ANSWER✔✔The use of data networks to carry voice (or
telephone), video, and other communications services in addition to data.
Question: According to DoD 8570.01-M, the IA (Information Assurance) technical category
consists of how many levels? - CORRECT ANSWER✔✔I, II, & III
Question: ICMP (Internet Control Message Protocol) - CORRECT ANSWER✔✔Used by a router
to exchange information with other routers
Question: MD5 algorithm - CORRECT ANSWER✔✔a hash function developed by Ron Rivest that
produces a 128-bit hash value
2
SUCCESS!
,Page 3 of 230
Question: Unix is: - CORRECT ANSWER✔✔- A trademark
- An operating system
Question: An internet - CORRECT ANSWER✔✔a network of computer networks
Question: data packet - CORRECT ANSWER✔✔A discrete unit of information sent from one
node on a network to another.
Question: Linux is written in: - CORRECT ANSWER✔✔C
Question: Which tool would be most effective for mapping a target network? - CORRECT
ANSWER✔✔Vulnerability scanner
Question: Configuration Management - CORRECT ANSWER✔✔The process of keeping track of
changes to the system, if needed, approving them.
Question: Boolean Search - CORRECT ANSWER✔✔uses logical operators such as AND, OR, and
NOT to link the words you are searching for
Question: Switch - CORRECT ANSWER✔✔Use the SWITCH statement when many blocks of code
are being executed.
3
SUCCESS!
, Page 4 of 230
Question: file server - CORRECT ANSWER✔✔A specialized server that enables clients to share
applications and data across
the network.
Question: Source code refers to: - CORRECT ANSWER✔✔A human readable version of
computer software
Question: Packet Sniffer - CORRECT ANSWER✔✔A device or program that monitors the data
traveling between computers on a network
Question: Confidentiality - CORRECT ANSWER✔✔prevents the disclosure of information to
unauthorized people, resources and processes
Question: Loops - CORRECT ANSWER✔✔Use when running the same code over and over again,
each time with a different value.
Question: What is the best protection method for sharing Personally Identifiable Information
(PII)? - CORRECT ANSWER✔✔Digitally sign and encrypt the email.
Question: HMAC (Hash-based Message Authentication Code) - CORRECT ANSWER✔✔they
strengthens hashing algorithms by using an additional secret key as input to the hash function
4
SUCCESS!
All ICTL EXAM AND STUDY GUIDE LATEST VERSION
THIS YEAR ALL 450 QUESTIONS AND CORRECT
DETAILED SOLUTIONS
ICTL EXAM
Hashing algorithm - CORRECT ANSWER✔✔a tool that ensures data integrity by taking binary
data and producing a fixed-length representation called the hash value or message digest
Question: backbone - CORRECT ANSWER✔✔The part of a network to which segments and
significant shared devices (such as routers, switches, and servers) connect.
Question: The implementation of an IA operational baseline will be an incremental process of
doing what? - CORRECT ANSWER✔✔Protecting critical assets
Question: One of the jobs of the kernel is to: - CORRECT ANSWER✔✔- Manage the system's
resources
Question: Five nines - CORRECT ANSWER✔✔when the system and services are available
99,999% of the time
Question: Antivirus protection - CORRECT ANSWER✔✔antimalware program that continuously
monitors for viruses
1
SUCCESS!
,Page 2 of 230
Question: Cryptology - CORRECT ANSWER✔✔the study of codes, or the art of writing and
solving them
Question: Computer Software - CORRECT ANSWER✔✔a set of instructions that directs the
computer in how to complete a task
Question: Methods used to ensure high availability - CORRECT ANSWER✔✔- eliminate single
points of failure
- design for reliability
- detect failures as they occur
Question: convergence - CORRECT ANSWER✔✔The use of data networks to carry voice (or
telephone), video, and other communications services in addition to data.
Question: According to DoD 8570.01-M, the IA (Information Assurance) technical category
consists of how many levels? - CORRECT ANSWER✔✔I, II, & III
Question: ICMP (Internet Control Message Protocol) - CORRECT ANSWER✔✔Used by a router
to exchange information with other routers
Question: MD5 algorithm - CORRECT ANSWER✔✔a hash function developed by Ron Rivest that
produces a 128-bit hash value
2
SUCCESS!
,Page 3 of 230
Question: Unix is: - CORRECT ANSWER✔✔- A trademark
- An operating system
Question: An internet - CORRECT ANSWER✔✔a network of computer networks
Question: data packet - CORRECT ANSWER✔✔A discrete unit of information sent from one
node on a network to another.
Question: Linux is written in: - CORRECT ANSWER✔✔C
Question: Which tool would be most effective for mapping a target network? - CORRECT
ANSWER✔✔Vulnerability scanner
Question: Configuration Management - CORRECT ANSWER✔✔The process of keeping track of
changes to the system, if needed, approving them.
Question: Boolean Search - CORRECT ANSWER✔✔uses logical operators such as AND, OR, and
NOT to link the words you are searching for
Question: Switch - CORRECT ANSWER✔✔Use the SWITCH statement when many blocks of code
are being executed.
3
SUCCESS!
, Page 4 of 230
Question: file server - CORRECT ANSWER✔✔A specialized server that enables clients to share
applications and data across
the network.
Question: Source code refers to: - CORRECT ANSWER✔✔A human readable version of
computer software
Question: Packet Sniffer - CORRECT ANSWER✔✔A device or program that monitors the data
traveling between computers on a network
Question: Confidentiality - CORRECT ANSWER✔✔prevents the disclosure of information to
unauthorized people, resources and processes
Question: Loops - CORRECT ANSWER✔✔Use when running the same code over and over again,
each time with a different value.
Question: What is the best protection method for sharing Personally Identifiable Information
(PII)? - CORRECT ANSWER✔✔Digitally sign and encrypt the email.
Question: HMAC (Hash-based Message Authentication Code) - CORRECT ANSWER✔✔they
strengthens hashing algorithms by using an additional secret key as input to the hash function
4
SUCCESS!