100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C182 Objective Assessment | Exam Questions with Correct Answers 2023/2024 (Graded A+)

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
09-08-2023
Written in
2023/2024

Like web server or file server in that REQUEST ARE FILES and RESPONDED ARE THE FILES data delivered between client and server. - FTP Server Devices connected along a SINGLE CABLE Size of network is restricted - Bus Network Each device is connected to a CENTRAL DEVICE such as a hub or switch. - Star Network Each device is connected DIRECTLY TO ITS NEIGHBOR and messages are forwarded from device to device until the proper destination is reached. - Ring Network Every device is connected directly to every other device in the network. - Mesh Network Identifies the server on which the web page can be found - Domain Name Always ends with a period and a THREE or TWO LETTER EXTENSION which signifies the TYPE of organization or country associated with the page - TLD (Top Level Domain) Name Exam: .edu .net . gov .org Indicates the name of the file you are accessing, or the location of the document on the server - Resource/ Filename ID Confidentiality, Integrity, Availability - CIA 1st - Must include a component that ensures the accuracy of the collected data 2nd - Must be entered into the system accurately 3rd - Data modification must be tracked - Data Integrity Efforts 1. Identify the organization's information assets 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats - Risk Management & Strategic Risk Analysis An attacker issues a SQL command to a web server as part of the URL or as input to a form on a company's website; web server might pass the command onto the database which then allows potentially anything to be done to the database - SQL Injection Placing malicious code into the buffer so that it can be executed once stored in memory; oldest and most well known software exploit; software engineers can protect against this when writing code - Buffer Overflow Informs companies of potential problems with software HACK ATTACKS so companies can fix the problems. - White Hat Hacker Individuals with MALICIOUS INTENT WHO VIOLATE SECURITY in order to commit crimes or acts of terrorism - Black Hat Hacker Engage in BOTH WHITE and BLACK hat types of hacking activities - Grey Hat Hacker Type of virus that completely replaces an existing application and takes the name of the taken over file - Trojan Horse Attempts to identify if a file contains a virus or some form of malware - Anti-virus Software Ensures proper storage of data by providing a means so that data is available even when storage devices are damaged or offline - Data Redundancy Uses the same key for performing the encryption and decryption - Symmetric Key Encryption Ensures that the user gains access only to the resources that the user should be able to access - Role-based Access Control 1. Cost savings benefits 2. Increased efficiency and productivity 3. Increased facilitation of communication - Computer Network Advantages Consists of programs that END USERS RUN to accomplish tasks - Application Software Consists of programs that MAKE UP THE OS software that directly supports the computer system itself - System Software Works with hardware to provide a NETWORK SERVICE - Server Software A LAN that uses the Internet Protocol - Intranet Core components of the OS that is loaded when the computer is first booted. - Kernel An interface for the user, often personalized for that given user, that provides access to the kernel. - Shell Administration and Support - IT Professional Roles Maintains all aspects of the system including hardware, software, and programming. - System Administrator Installs, configures, and administers firewall security to protect systems and proactively work to stop intrusions. - Security Administrator Help desk and training. - Support IT Professionals Defines the transition of data to information from knowledge to wisdom. (Data Information Knowledge Wisdom) - DIKW Hierarchy The input directly received by the user (or computer). It is generally not usable until it has been converted into a relevant form. - Data in DIKW Having been inferred from data; one or more processes have been applied to the data to transform it into a more useful form. - Information in DIKW A collection of data and information used to support the management of an organization. Also refers to the technical components and human resources that enable the assembly, storage, and processing of data and the delivery of information. This has existed for a lot longer than computers. - Information Systems RELEVANCE - the data being used must apply directly to the decision being made TIMELY - data must be efficient and must be provided in a timely manner THOROUGH - the data must be complete ACCURATE - data should be captured only once, where possible and should be captured as close to the point of activity as possible. RELIABLE - data should reflect stable and consistent data collection processes across collections points and over time - Characteristics of Quality Data

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 9, 2023
Number of pages
10
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • introduction to it
  • graded

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
STUDYROOM2024 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
397
Member since
2 year
Number of followers
212
Documents
3948
Last sold
1 week ago

For all Nursing Test Banks visit my page. All Papers are Verified and Graded to Score A++ Wish you Success.

3.5

59 reviews

5
19
4
14
3
13
2
4
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions