100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten
logo-home
WGU D322 Intro to IT Study Questions with Correct Answers $11.99
In winkelwagen

Tentamen (uitwerkingen)

WGU D322 Intro to IT Study Questions with Correct Answers

 0 keer verkocht
  • Vak
  • WGU D322 Intro to IT
  • Instelling
  • WGU D322 Intro To IT

WGU D322 Intro to IT Study Questions with Correct Answers Wireless access point - Answer-connected to a hub, a switch, or a router. This device then sends out a wireless signal so computers on the network can connect without a cable Radio waves - Answer-provide access to networks over long dist...

[Meer zien]

Voorbeeld 2 van de 10  pagina's

  • 20 augustus 2024
  • 10
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • WGU D322 Intro to IT
  • WGU D322 Intro to IT
avatar-seller
Scholarsstudyguide
WGU D322 Intro to IT Study Questions
with Correct Answers

Wireless access point - Answer-connected to a hub, a switch, or a router. This device
then sends out a wireless signal so computers on the network can connect without a
cable

Radio waves - Answer-provide access to networks over long distances

IP address - Answer-a series of numbers that indicates a specific internet location

Server - Answer-computer that takes requests and responds with the requested
information

Network Types - Answer-Bus Network
Mesh Network
Ring Network
Star Network

Bus Network - Answer-devices are connected along a single cable

Mesh Network - Answer-Every device is connected directly to every other device in the
network.

Ring Network - Answer-Each device is connected directly to its neighbors, and
messages are forwarded from device to device until the proper destination is reached.

Star Network - Answer-have a single machine serving as a central point to which all
others are connected.

Confidentiality - Answer-requires that data be kept secure so that they are not
accidentally provided to unauthorized individuals and cannot be obtained by
unauthorized users.

Integrity - Answer-requires that data are correct

Availability - Answer-requires that information is available when needed

Strategic risk analysis - Answer-security policies are translated into mechanisms which
support information security. We will focus on the risk management process

, Social engineering - Answer-threat that targets users.

Phishing - Answer-is the process of targeting a specific individual, usually via email,
under the guise of a reputable or trustworthy entity to reveal private or personal details
such as usernames or password

Hacking - Answer-is when an individual obtains unauthorized access to a host

Malware - Answer-"malicious" software

Spyware - Answer-is often downloaded unknown to the user when accessing web
storages.

Denial of service (DOS) attack - Answer-In the DOS attack, one or more attackers
attempts to flood a server with so many incoming messages that the server is unable to
handle legitimate business

Firewalls - Answer-prevent certain types of messages from coming into or out of the
network and anti-viral software seeks out malware

Antivirus software - Answer-attempts to identify if a file contains a virus or, more
generally, some form of malware.

Information security - Answer-attempts to ensure the confidentiality, integrity, and
availability of information when it is stored, processed, and transmitted (across a
network)

Encryption - Answer-is the idea of obfuscating the information that resides on a
computer or is sent over a network so that if it is intercepted the hacker will be unable to
use the information. Encryption uses a mathematical algorithm for converting the plain-
text information to the encrypted form

Administration - Answer-An administrator is in charge of some portion of the IT
infrastructure.

Network administrator - Answer-oversees all aspects of the computer network. The
network administrator's duties include physically laying down cable, making
connections, and working with the network hardware (for instance, routers and
switches).

Database administrator - Answer-focus on the design, development, and support of
database management systems (DBMSs). Tasks will include installation, maintenance,
performance analysis, and troubleshooting as with the other administrative areas

Dit zijn jouw voordelen als je samenvattingen koopt bij Stuvia:

Bewezen kwaliteit door reviews

Bewezen kwaliteit door reviews

Studenten hebben al meer dan 850.000 samenvattingen beoordeeld. Zo weet jij zeker dat je de beste keuze maakt!

In een paar klikken geregeld

In een paar klikken geregeld

Geen gedoe — betaal gewoon eenmalig met iDeal, creditcard of je Stuvia-tegoed en je bent klaar. Geen abonnement nodig.

Direct to-the-point

Direct to-the-point

Studenten maken samenvattingen voor studenten. Dat betekent: actuele inhoud waar jij écht wat aan hebt. Geen overbodige details!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Scholarsstudyguide. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor $11.99. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 67619 samenvattingen verkocht

Opgericht in 2010, al 15 jaar dé plek om samenvattingen te kopen

Begin nu gratis
$11.99
  • (0)
In winkelwagen
Toegevoegd