100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D322 Intro to IT Study Questions with Correct Answers $11.99   Add to cart

Exam (elaborations)

WGU D322 Intro to IT Study Questions with Correct Answers

 0 view  0 purchase
  • Course
  • WGU D322 Intro to IT
  • Institution
  • WGU D322 Intro To IT

WGU D322 Intro to IT Study Questions with Correct Answers Wireless access point - Answer-connected to a hub, a switch, or a router. This device then sends out a wireless signal so computers on the network can connect without a cable Radio waves - Answer-provide access to networks over long dist...

[Show more]

Preview 2 out of 10  pages

  • August 20, 2024
  • 10
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D322 Intro to IT
  • WGU D322 Intro to IT
avatar-seller
Scholarsstudyguide
WGU D322 Intro to IT Study Questions
with Correct Answers

Wireless access point - Answer-connected to a hub, a switch, or a router. This device
then sends out a wireless signal so computers on the network can connect without a
cable

Radio waves - Answer-provide access to networks over long distances

IP address - Answer-a series of numbers that indicates a specific internet location

Server - Answer-computer that takes requests and responds with the requested
information

Network Types - Answer-Bus Network
Mesh Network
Ring Network
Star Network

Bus Network - Answer-devices are connected along a single cable

Mesh Network - Answer-Every device is connected directly to every other device in the
network.

Ring Network - Answer-Each device is connected directly to its neighbors, and
messages are forwarded from device to device until the proper destination is reached.

Star Network - Answer-have a single machine serving as a central point to which all
others are connected.

Confidentiality - Answer-requires that data be kept secure so that they are not
accidentally provided to unauthorized individuals and cannot be obtained by
unauthorized users.

Integrity - Answer-requires that data are correct

Availability - Answer-requires that information is available when needed

Strategic risk analysis - Answer-security policies are translated into mechanisms which
support information security. We will focus on the risk management process

, Social engineering - Answer-threat that targets users.

Phishing - Answer-is the process of targeting a specific individual, usually via email,
under the guise of a reputable or trustworthy entity to reveal private or personal details
such as usernames or password

Hacking - Answer-is when an individual obtains unauthorized access to a host

Malware - Answer-"malicious" software

Spyware - Answer-is often downloaded unknown to the user when accessing web
storages.

Denial of service (DOS) attack - Answer-In the DOS attack, one or more attackers
attempts to flood a server with so many incoming messages that the server is unable to
handle legitimate business

Firewalls - Answer-prevent certain types of messages from coming into or out of the
network and anti-viral software seeks out malware

Antivirus software - Answer-attempts to identify if a file contains a virus or, more
generally, some form of malware.

Information security - Answer-attempts to ensure the confidentiality, integrity, and
availability of information when it is stored, processed, and transmitted (across a
network)

Encryption - Answer-is the idea of obfuscating the information that resides on a
computer or is sent over a network so that if it is intercepted the hacker will be unable to
use the information. Encryption uses a mathematical algorithm for converting the plain-
text information to the encrypted form

Administration - Answer-An administrator is in charge of some portion of the IT
infrastructure.

Network administrator - Answer-oversees all aspects of the computer network. The
network administrator's duties include physically laying down cable, making
connections, and working with the network hardware (for instance, routers and
switches).

Database administrator - Answer-focus on the design, development, and support of
database management systems (DBMSs). Tasks will include installation, maintenance,
performance analysis, and troubleshooting as with the other administrative areas

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73091 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.99
  • (0)
  Add to cart