100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
PA PCCET Study Guide with complete solutions $12.49   Add to cart

Exam (elaborations)

PA PCCET Study Guide with complete solutions

 5 views  0 purchase
  • Course
  • PA PCCET
  • Institution
  • PA PCCET

PA PCCET Study Guide with complete solutions

Preview 2 out of 14  pages

  • August 7, 2024
  • 14
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • PA PCCET
  • PA PCCET
avatar-seller
millyphilip
PA PCCET Study Guide with complete
solutions

True or False: Business intelligence (BI) software consists of tools and techniques used
to surface large amounts of raw unstructured data to perform a variety of tasks,
including data mining, event processing, and predictive analytics. - Answer -True

True or False: The process in which end users find personal technology and apps that
are more powerful or capable, more convenient, less expensive, quicker to install, and
easier to use than enterprise IT solutions is known as consumerization. - Answer -True

Which action is associated with Web 1.0? - Answer -checking CNN's website for news

Which action is associated with Web 3.0? - Answer -asking Apple's Siri a question

Gmail is associated with which cloud computing model? - Answer -SaaS

Which two port numbers are associated with HTTP? (Choose two.) - Answer -80, 8080

Which port number is associated with HTTPS? - Answer -443

Which port is used for encrypted communication? - Answer -22

Which protocol distinguishes between applications using port numbers? - Answer -TCP

How do attackers prevent port scans from being noticed by monitoring software? -
Answer -Scan ports so quickly it is finished before it can be detected and stopped

Which potentially risky attribute is the most serious? - Answer -Malware

Which one of these applications can be used as a tunnel for other applications? -
Answer -SSH

Which two devices or systems require the configuration of non-standard ports to be able
to use an application on a non-standard port? (Choose two.) - Answer -Client, Server

, If you are responsible for the application's security, but not the operating system's
security, which cloud computing service model are you using? - Answer -PaaS

Which kind of security always is the responsibility of the cloud customer? - Answer -
Data Security

Where is your data typically stored in a SaaS application? - Answer -in the cloud, in a
database controlled by the SaaS provider

Who is responsible for the security settings in an enterprise SaaS application? (choose
the best answer) - Answer -Both IT administrators and users

When is it impossible to secure SaaS data? - Answer -when a user uses an unmanaged
device to access an unsanctioned SaaS

True or False. An organization can be compliant with all applicable security and privacy
regulations for its industry yet still not be secure. - Answer -True

Which three data fields are considered personally identifiable information (PII)? (select
three) - Answer -unique identification number (such as driver's license number), phone
number, fingerprints

Which risk is eliminated in an organization that is 100% compliant? - Answer -having the
regulator punish you for being non-compliant

What does CVE mean? - Answer -Common Vulnerabilities and Exposures

What is the difference between CVE and CVSS? - Answer -CVE tells you what the
vulnerabilities are. CVSS gives vulnerabilities a score (0- 10) to evaluate how serious
they are.

True or False. External threat actors have accounted for the majority of data breaches
over the past five years. - Answer -True

Which group is likely to attack indiscriminately, whether you are a valuable target or
not? - Answer -Cyberterrorists

Which group is primarily motivated by money? - Answer -Cybercriminals

True or False: The cyberattack lifecycle is a seven-step process. - Answer -True

True or False: An attacker needs to succeed in executing only one step of the
cyberattack lifecycle to infiltrate a network, whereas a defender must "be right every
time" and break every step of the chain to prevent an attack. - Answer -False

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller millyphilip. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart