// // // // //
Hashing /
/algorithm //- //CORRECT //ANSWERS(S)✔✔a //tool //that //ensures //data //integrity //by //taking //binary
//data //and //producing //a //fixed-
length //representation //called //the //hash //value //or //message //digest
backbone //- /
/CORRECT /
/ANSWERS(S)✔✔The /
/part /
/of //
a/
/network /
/to /
/which /
/segments /
/and //significant //shared //devices //(such //as //routers, //switches, //and //servers) //connect.
The /
/implementation /
/of /
/an /
/IA /
/operational /
/baseline /
/will /
/be /
/an /
/incremental //process //of //doing //what? //- //CORRECT //ANSWERS(S)✔✔Protecting //critical //assets
One /
/of /
,/the /
/jobs //of //the //kernel //is //to: //- //CORRECT //ANSWERS(S)✔✔- //Manage //the //system's //resources
Five /
/nines //- /
/CORRECT /
/ANSWERS(S)✔✔when //the //system //and //services //are //available //99,999% //of //the //time
Antivirus /
/protection //- /
/CORRECT //ANSWERS(S)✔✔antimalware //program //that //continuously //monitors //for //viruses
Cryptology //- /
/CORRECT //ANSWERS(S)✔✔the //study //of //codes, //or //the //art //of //writing //and //solving //them
Computer /
/Software //- /
/CORRECT /
/ANSWERS(S)✔✔a /
/set //of //instructions //that //directs //the //computer //in //how //to //complete //a //task
Methods /
/used /
/to //ensure //high //availability //- //CORRECT //ANSWERS(S)✔✔- //eliminate //single //points //of //failure
- //design //for //reliability //
- //detect //failures //as //they //occur
convergence //- /
/CORRECT /
/ANSWERS(S)✔✔The /
/use /
/of /
,/data /
/networks /
/to /
/carry /
/voice //(or //telephone), //video, //and //other //communications //services //in //addition //to //data.
According //to //DoD //8570.01-
M, /
/the /
/IA /
/(Information /
/Assurance) /
/technical //category //consists //of //how //many //levels? //- //CORRECT //ANSWERS(S)✔✔I, //II, //& //III
ICMP /
/(Internet /
/Control /
/Message /
/Protocol) //- /
/CORRECT //ANSWERS(S)✔✔Used //by //a //router //to //exchange //information //with //other //routers
MD5 /
/algorithm //- /
/CORRECT /
/ANSWERS(S)✔✔a //hash //function //developed //by //Ron //Rivest //that //produces //a //128-
bit //hash //value
Unix //is: //- //CORRECT //ANSWERS(S)✔✔- //A //trademark
- //An //operating //system
An //internet //- //CORRECT //ANSWERS(S)✔✔a //network //of //computer //networks
, data /
/packet //- /
/CORRECT /
/ANSWERS(S)✔✔A /
/discrete //unit //of //information //sent //from //one //node //on //a //network //to //another.
Linux //is //written //in: //- //CORRECT //ANSWERS(S)✔✔C
Which /
/tool /
/would /
/be /
/most /
/effective /
/for //mapping //a //target //network? //- //CORRECT //ANSWERS(S)✔✔Vulnerability //scanner
Configuration /
/Management //- /
/CORRECT /
/ANSWERS(S)✔✔The /
/process //of //keeping //track //of //changes //to //the //system, //if //needed, //approving //them.
Boolean /
/Search //- /
/CORRECT /
/ANSWERS(S)✔✔uses /
/logical //operators //such //as //AND, //OR, //and //NOT //to //link //the //words //you //are //searching //for
Switch //- /
/CORRECT /
/ANSWERS(S)✔✔Use /
/the //SWITCH //statement //when //many //blocks //of //code //are //being //executed.