WGU C182 Objective Assessment | Exam Questions with Correct Answers 2023/2024 (Graded A+)
Like web server or file server in that REQUEST ARE FILES and RESPONDED ARE THE FILES data delivered between client and server. - FTP Server Devices connected along a SINGLE CABLE Size of network is restricted - Bus Network Each device is connected to a CENTRAL DEVICE such as a hub or switch. - Star Network Each device is connected DIRECTLY TO ITS NEIGHBOR and messages are forwarded from device to device until the proper destination is reached. - Ring Network Every device is connected directly to every other device in the network. - Mesh Network Identifies the server on which the web page can be found - Domain Name Always ends with a period and a THREE or TWO LETTER EXTENSION which signifies the TYPE of organization or country associated with the page - TLD (Top Level Domain) Name Exam: .edu .net . gov .org Indicates the name of the file you are accessing, or the location of the document on the server - Resource/ Filename ID Confidentiality, Integrity, Availability - CIA 1st - Must include a component that ensures the accuracy of the collected data 2nd - Must be entered into the system accurately 3rd - Data modification must be tracked - Data Integrity Efforts 1. Identify the organization's information assets 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats - Risk Management & Strategic Risk Analysis An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company's website; web server might pass the command onto the database which then allows potentially anything to be done to the database - SQL Injection Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code - Buffer Overflow Informs companies of potential problems with software HACK ATTACKS so companies can fix the problems. - White Hat Hacker Individuals with MALICIOUS INTENT WHO VIOLATE SECURITY in order to commit crimes or acts of terrorism - Black Hat Hacker Engage in BOTH WHITE and BLACK hat types of hacking activities - Grey Hat Hacker Type of virus that completely replaces an existing application and takes the name of the taken over file - Trojan Horse Attempts to identify if a file contains a virus or some form of malware - Anti-virus Software Ensures proper storage of data by providing a means so that data is available even when storage devices are damaged or offline - Data Redundancy Uses the same key for performing the encryption and decryption - Symmetric Key Encryption Ensures that the user gains access only to the resources that the user should be able to access - Role-based Access Control 1. Cost savings benefits 2. Increased efficiency and productivity 3. Increased facilitation of communication - Computer Network Advantages Consists of programs that END USERS RUN to accomplish tasks - Application Software Consists of programs that MAKE UP THE OS software that directly supports the computer system itself - System Software Works with hardware to provide a NETWORK SERVICE - Server Software A LAN that uses the Internet Protocol - Intranet Core components of the OS that is loaded when the computer is first booted. - Kernel An interface for the user, often personalized for that given user, that provides access to the kernel. - Shell Administration and Support - IT Professional Roles Maintains all aspects of the system including hardware, software, and programming. - System Administrator Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions. - Security Administrator Help desk and training. - Support IT Professionals Defines the transition of data to information from knowledge to wisdom. (Data Information Knowledge Wisdom) - DIKW Hierarchy The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form. - Data in DIKW Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form. - Information in DIKW A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers. - Information Systems RELEVANCE - the data being used must apply directly to the decision being made TIMELY - data must be efficient and must be provided in a timely manner THOROUGH - the data must be complete ACCURATE - data should be captured only once, where possible and should be captured as close to the point of activity as possible. RELIABLE - data should reflect stable and consistent data collection processes across collections points and over time - Characteristics of Quality Data
Written for
Document information
- Uploaded on
- August 9, 2023
- Number of pages
- 10
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- introduction to it
- graded
-
introduction to it – wgu c182
-
wgu c182 objective assessment
-
wgu c182 objective assessment | exam questions
-
exam questions with correct answers 20232024
Also available in package deal