QICTL QUESTIONS AND VERIFIED
RATIONALIZED ANSWERS 100%
GUARANTEE PASS
Hashing algorithm - a tool that ensures data integrity by taking binary data and producing a fixed-length
representation called the hash value or message digest
backbone - The part of a network to which segments and significant shared devices (such as routers,
switches, and servers) connect.
The implementation of an IA operational baseline will be an incremental process of doing what? -
Protecting critical assets
One of the jobs of the kernel is to: - - Manage the system's resources
Five nines - when the system and services are available 99,999% of the time
Antivirus protection - antimalware program that continuously monitors for viruses
Cryptology - the study of codes, or the art of writing and solving them
Computer Software - a set of instructions that directs the computer in how to complete a task
Methods used to ensure high availability - - eliminate single points of failure
- design for reliability
- detect failures as they occur
,convergence - The use of data networks to carry voice (or telephone), video, and other communications
services in addition to data.
According to DoD 8570.01-M, the IA (Information Assurance) technical category consists of how many
levels? - I, II, & III
ICMP (Internet Control Message Protocol) - Used by a router to exchange information with other routers
MD5 algorithm - a hash function developed by Ron Rivest that produces a 128-bit hash value
Unix is: - - A trademark
- An operating system
An internet - a network of computer networks
data packet - A discrete unit of information sent from one node on a network to another.
Linux is written in: - C
Which tool would be most effective for mapping a target network? - Vulnerability scanner
Configuration Management - The process of keeping track of changes to the system, if needed,
approving them.
Boolean Search - uses logical operators such as AND, OR, and NOT to link the words you are searching for
Switch - Use the SWITCH statement when many blocks of code are being executed.
file server - A specialized server that enables clients to share applications and data across
the network.
,Source code refers to: - A human readable version of computer software
Packet Sniffer - A device or program that monitors the data traveling between computers on a network
Confidentiality - prevents the disclosure of information to
unauthorized people, resources and processes
Loops - Use when running the same code over and over again, each time with a different value.
What is the best protection method for sharing Personally Identifiable Information (PII)? - Digitally sign
and encrypt the email.
HMAC (Hash-based Message Authentication Code) - they strengthens hashing algorithms by using an
additional secret key as input to the hash function
host - A computer that enables resource sharing by other computers on the same network
Public Domain - works that are not restricted by copyright; they are owned by the public and can be
freely used
Ransomware - holds a computer system or the data it contains captive until the target makes a payment
Internet Service Providers - provide an access path to the Internet
Methods used to ensure confidentiality - data encryption, authentication, and access control.
3DES (Triple Data Encryption Algorithm) - a symmetric block cipher with 64-bit block size that uses a 56-
bit key, encrypts data three times and uses a different key for at least one of the three passes, giving it a
cumulative key size of 112-168 bits
, Script Kiddies - teenagers or hobbyists mostly limited to pranks
and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to
launch attacks.
Most of the tools that are part of Linux systems come from: - The GNU (GNU's Not Unix!) project
While Loop - loops through a block of code while a specified condition is true
Vulnerability Brokers - grey hat hackers who attempt to discover
exploits and report them to vendors, sometimes for prizes or rewards
Having reviewed DoD Wireless STIG (Ver6, Release 1), Sarah learns she may only utilize SecNet 54 and
______________ for transmitting classified information up to Top Secret. - KOV-26 Talon
Risk Analysis - The process of identifying security risks, determining their magnitude, and identifying
areas needing safeguards
Digital certificate - it enable users, hosts, and organizations to exchange information securely over the
Internet
The Linux platform that runs on mobile phones is called: - Android
3D Spreadsheets - enable you to link multiple worksheets together
Authorization - services that determine which
resources users can access, along with the operations that users can perform, after the user is granted
access once authentication is complete
Hacktivists - grey hat hackers who rally and protest against
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller knowledgeNest. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.49. You're not tied to anything after your purchase.