100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten
logo-home
WGU- D322 Intro to IT Test Questions and Answers All Correct $13.09
In winkelwagen

Tentamen (uitwerkingen)

WGU- D322 Intro to IT Test Questions and Answers All Correct

 0 keer verkocht
  • Vak
  • WGU- D322 Intro to IT
  • Instelling
  • WGU- D322 Intro To IT

WGU- D322 Intro to IT Test Questions and Answers All Correct Strategic risk analysis - Answer-security policies are translated into mechanisms which support information security. We will focus on the risk management process Social engineering - Answer-threat that targets users. Phishing - An...

[Meer zien]

Voorbeeld 2 van de 10  pagina's

  • 22 augustus 2024
  • 10
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • WGU- D322 Intro to IT
  • WGU- D322 Intro to IT
avatar-seller
Scholarsstudyguide
WGU- D322 Intro to IT Test Questions
and Answers All Correct

Strategic risk analysis - Answer-security policies are translated into mechanisms which
support information security. We will focus on the risk management process

Social engineering - Answer-threat that targets users.

Phishing - Answer-is the process of targeting a specific individual, usually via email,
under the guise of a reputable or trustworthy entity to reveal private or personal details
such as usernames or password

Hacking - Answer-is when an individual obtains unauthorized access to a host

Malware - Answer-"malicious" software

Spyware - Answer-is often downloaded unknown to the user when accessing web
storages.

Denial of service (DOS) attack - Answer-In the DOS attack, one or more attackers
attempts to flood a server with so many incoming messages that the server is unable to
handle legitimate business

Firewalls - Answer-prevent certain types of messages from coming into or out of the
network and anti-viral software seeks out malware

Antivirus software - Answer-attempts to identify if a file contains a virus or, more
generally, some form of malware.

Information security - Answer-attempts to ensure the confidentiality, integrity, and
availability of information when it is stored, processed, and transmitted (across a
network)

Encryption - Answer-is the idea of obfuscating the information that resides on a
computer or is sent over a network so that if it is intercepted the hacker will be unable to
use the information. Encryption uses a mathematical algorithm for converting the plain-
text information to the encrypted form

Symmetric key encryption - Answer-uses the same key for performing the encryption
and decryption.

, Public-key encryption - Answer-uses two keys, a public and private key.

Software - Answer-is the term we use for the systems and programs that are developed,
as a result of programming and scripting efforts by individuals, to perform a business
function

Application software - - Answer-consists of programs that end users run to accomplish
tasks

System software - Answer-consists of programs that make up the operating system

Server software - Answer-works with hardware to provide a network service

Cloud computing - Answer-combines several different technologies: distributed
computing, computer networks, and storage area networks. The idea is to offer, as a
service, the ability to offload computation and storage from your local computer to the
cloud

Operating system (OS) - Answer-is a program. Its primary task is to allow a computer
user to easily access the hardware and software of a computer system. Beyond this, we
might say that an OS is required to maintain the computer's environment. (Windows
7/8/10, Linux,and Mac OS X., Android, Windows, and iOS)

Operating System Components
(System software) - Answer-User
Applications
OS utilities
Services
Shells
OS Kernel
Software device drivers
OM BIOS drivers
Hardware

Kernel - Answer-The core components of the operating system

Device drivers - Answer-provide specific interfaces between the OS running a computer
and hardware

Shell - Answer-an interface for the user, often personalized for that given user

System utilities - Answer-programs that allow the user to monitor and improve system
performance.

GUI - Answer-allows a user to control the computer by using the mouse and pointing
and clicking at objects on the screen (icons, menus, buttons, etc.).

Dit zijn jouw voordelen als je samenvattingen koopt bij Stuvia:

Bewezen kwaliteit door reviews

Bewezen kwaliteit door reviews

Studenten hebben al meer dan 850.000 samenvattingen beoordeeld. Zo weet jij zeker dat je de beste keuze maakt!

In een paar klikken geregeld

In een paar klikken geregeld

Geen gedoe — betaal gewoon eenmalig met iDeal, Bancontact of creditcard en je bent klaar. Geen abonnement nodig.

Focus op de essentie

Focus op de essentie

Studenten maken samenvattingen voor studenten. Dat betekent: actuele inhoud waar jij écht wat aan hebt. Geen overbodige details!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Scholarsstudyguide. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor $13.09. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 64670 samenvattingen verkocht

Opgericht in 2010, al 15 jaar dé plek om samenvattingen te kopen

Start met verkopen
$13.09
  • (0)
In winkelwagen
Toegevoegd