EXAM PDF / WGU C182 OBJECTIVE
ASSESSMENT PREPARATION/WGU C182 OA
PRACTICE REAL EXAM QUESTIONS AND
ANSWERS
Cost savings benefits 2. Increased efficiency and productivity 3. Increased
facilitation of communication
Computer Network Advantages
Consists of programs that END USERS RUN to accomplish tasks
Application Software
Consists of programs that MAKE UP THE OS software that directly supports the
computer system itself
System Software
Works with hardware to provide a NETWORK SERVICE
Server Software
A LAN that uses the Internet Protocol
Intranet
First users were the engineers who built and programmed computers, then
employees who had received specialized training were users, and now today,
anyone and everyone can be a user.
Evolution of Users
What does BIOS stand for
Basic input output system
,The basic operating system that runs when a computer is first turned on. It runs
test of memory and the cpu,and initilizes hardware components so that the
actual Operating system can be loaded from the hard disk.
BIOS ROM
Temporarily stores data before it is processed and sent to your screen or
printer.
RAM
Volitile memory that disappears when the computer is turned off or loses
power.
RAM
Programmer is limited to high level control constructs such as while loops, for
loops, and if/else statements and not allowed to use primitive GOTO
statements
Structured Programming
A type of programming language for which most of its implementations
EXECUTES INSTRUCTIONS DIRECTLY AND FREELY, without previously compiling a
program into machine-language instructions.
Interpreted Language (Code)
Small programs that place Linux commands or DOS batch files into a file
Shell Scripting
The computer that the user is using; physically present with
Local Computer
Connects computers to each other with NO REAL UNDERSTANDING OF WHAT IS
BEING TRANSFERRED Used for private networks with local computers.
Network Hub
Like a hub, but this will only send data that is INTENDED FOR SPECIFIC
COMPUTER
,Network Switch
Can be connected to hub, switch, or router; many routers now also act as a
wireless access point; sends out a wireless signal so computers on the network
can connect without a cable
Wireless Access Point
Contains one or more servers; client is a computer that will request information
from another computer; server is a computer that takes requests and responds
with the requested information; the software used facilitates communication
with remote servers
Client-server Network
Stores data files (web pages) and programs (scripts). Responds from anywhere
on the Internet.
Web Server
Monitors print jobs
Print Server
Like web server or file server in that REQUEST ARE FILES and RESPONDED ARE
THE FILES data delivered between client and server.
FTP Server
Devices connected along a SINGLE CABLE Size of network is restricted
Bus Network
Each device is connected to a CENTRAL DEVICE such as a hub or switch.
Star Network
Each device is connected DIRECTLY TO ITS NEIGHBOR and messages are
forwarded from device to device until the proper destination is reached.
Ring Network
Every device is connected directly to every other device in the network.
Mesh Network
, Identifies the server on which the web page can be found
Domain Name
Always ends with a period and a THREE or TWO LETTER EXTENSION which
signifies the TYPE of organization or country associated with the page
TLD (Top Level Domain) Name Exam: www.yourname.com .edu .net . gov .org
Indicates the name of the file you are accessing, or the location of the document
on the server
Resource/ Filename ID
Confidentiality, Integrity, Availability
CIA
1st - Must include a component that ensures the accuracy of the collected data
2nd - Must be entered into the system accurately 3rd - Data modification must
be tracked
Data Integrity Efforts
1. Identify the organization's information assets 2. Identify vulnerabilities of
each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies
that will reduce threats
Risk Management & Strategic Risk Analysis
An attacker issues a SQL command to a web server as part of the URL or as input
to a form on a company's website; web server might pass the command onto
the database which then allows potentially anything to be done to the database
SQL Injection
Placing malicious code into the buffer so that it can be executed once stored in
memory; oldest and most well known software exploit; software engineers can
protect against this when writing code
Buffer Overflow
Informs companies of potential problems with software HACK ATTACKS so
companies can fix the problems.