100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

All ICTL EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS

Puntuación
-
Vendido
-
Páginas
141
Grado
A+
Subido en
10-12-2024
Escrito en
2024/2025

All ICTL EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS

Institución
All ICTL
Grado
All ICTL











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
All ICTL
Grado
All ICTL

Información del documento

Subido en
10 de diciembre de 2024
Número de páginas
141
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

All ICTL EXAM QUESTIONS WITH CORRECT
DETAILED ANSWERS
QUESTION>promiscuous mode - ANSWER ~In a network adapter, this passes all traffic to the CPU, not
just the frames addressed to it. When the network adapter captures all packets that it has access to
regardless of the destination for those packets.



QUESTION>Wireless router - ANSWER ~Attaches to a wired network and provides access to that wired
network for wirelessly attached clients, like a wireless AP(access point). However, a wireless router is
configured such that the wired interface that connects to the rest of the network (or to the Internet) is
on a different IP network than the wireless clients. Typically, a wireless router performs NATing (network
address translation) between these two IP address spaces.



QUESTION>Private IP - ANSWER ~- An internal IP address assigned to each device on a network for
communication between one another.

- This IP address must be within a specified group of available addresses in order to operate.



QUESTION>Networking advantages - ANSWER ~Allows for sharing of files, Allows for peripheral devices
such as printers to be shared, Allows people to communicate easily, Allowing people to use the same
account on multiple devices



QUESTION>Fraggle - ANSWER ~A type of DoS similar to the Smurf attack, but the traffic sent is UDP echo
traffic as opposed to ICMP echo traffic.



QUESTION>public key - ANSWER ~A type of key that is known to all parties involved in encrypted
transactions within a given group.



QUESTION>open - ANSWER ~A broken strand of copper that prevents current from flowing through a

circuit.



QUESTION>Hashing algorithm - ANSWER ~a tool that ensures data integrity by taking binary data and
producing a fixed-length representation called the hash value or message digest

,QUESTION>backbone - ANSWER ~The part of a network to which segments and significant shared
devices (such as routers, switches, and servers) connect.



QUESTION>The implementation of an IA operational baseline will be an incremental process of doing
what? - ANSWER ~Protecting critical assets



QUESTION>One of the jobs of the kernel is to: - ANSWER ~- Manage the system's resources



QUESTION>Five nines - ANSWER ~when the system and services are available 99,999% of the time



QUESTION>Antivirus protection - ANSWER ~antimalware program that continuously monitors for
viruses



QUESTION>Cryptology - ANSWER ~the study of codes, or the art of writing and solving them



QUESTION>Computer Software - ANSWER ~a set of instructions that directs the computer in how to
complete a task



QUESTION>Methods used to ensure high availability - ANSWER ~- eliminate single points of failure

- design for reliability

- detect failures as they occur



QUESTION>convergence - ANSWER ~The use of data networks to carry voice (or telephone), video, and
other communications services in addition to data.



QUESTION>According to DoD 8570.01-M, the IA (Information Assurance) technical category consists of
how many levels? - ANSWER ~I, II, & III



QUESTION>ICMP (Internet Control Message Protocol) - ANSWER ~Used by a router to exchange
information with other routers

,QUESTION>MD5 algorithm - ANSWER ~a hash function developed by Ron Rivest that produces a 128-bit
hash value



QUESTION>Unix is: - ANSWER ~- A trademark

- An operating system



QUESTION>An internet - ANSWER ~a network of computer networks



QUESTION>data packet - ANSWER ~A discrete unit of information sent from one node on a network to
another.



QUESTION>Linux is written in: - ANSWER ~C



QUESTION>Which tool would be most effective for mapping a target network? - ANSWER ~Vulnerability
scanner



QUESTION>Configuration Management - ANSWER ~The process of keeping track of changes to the
system, if needed, approving them.



QUESTION>Boolean Search - ANSWER ~uses logical operators such as AND, OR, and NOT to link the
words you are searching for



QUESTION>Switch - ANSWER ~Use the SWITCH statement when many blocks of code are being
executed.



QUESTION>file server - ANSWER ~A specialized server that enables clients to share applications and
data across

the network.



QUESTION>Source code refers to: - ANSWER ~A human readable version of computer software

, QUESTION>Packet Sniffer - ANSWER ~A device or program that monitors the data traveling between
computers on a network



QUESTION>Confidentiality - ANSWER ~prevents the disclosure of information to

unauthorized people, resources and processes



QUESTION>Loops - ANSWER ~Use when running the same code over and over again, each time with a
different value.



QUESTION>What is the best protection method for sharing Personally Identifiable Information (PII)? -
ANSWER ~Digitally sign and encrypt the email.



QUESTION>HMAC (Hash-based Message Authentication Code) - ANSWER ~they strengthens hashing
algorithms by using an additional secret key as input to the hash function



QUESTION>host - ANSWER ~A computer that enables resource sharing by other computers on the same
network



QUESTION>Public Domain - ANSWER ~works that are not restricted by copyright; they are owned by the
public and can be freely used



QUESTION>Ransomware - ANSWER ~holds a computer system or the data it contains captive until the
target makes a payment



QUESTION>Internet Service Providers - ANSWER ~provide an access path to the Internet



QUESTION>Methods used to ensure confidentiality - ANSWER ~data encryption, authentication, and
access control.



QUESTION>3DES (Triple Data Encryption Algorithm) - ANSWER ~a symmetric block cipher with 64-bit
block size that uses a 56-bit key, encrypts data three times and uses a different key for at least one of the
three passes, giving it a cumulative key size of 112-168 bits
$24.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
kasuuvictor18

Conoce al vendedor

Seller avatar
kasuuvictor18 Johns Hopkins University School Of Medicine
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2
Miembro desde
1 año
Número de seguidores
0
Documentos
195
Última venta
7 meses hace

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes