Ace prep Exams
On this page, you find all documents, package deals, and flashcards offered by seller rickyenzo329.
- 521
- 0
- 8
Community
- Followers
- Following
528 items
Intro to Cryptography WGU C839 Module 3 Questions and Answers 100% Pass
Consists of public and private keys 
The public key is made public by publishing to a directory or installed on a computer. 
The private key is kept secret 
Does not involve exchanging a secret key or key exchange 
The public key is used to encrypt messages only the recipients private key can decrypt 
Asymmetric Cryptography 
Slower then Symmetric algorithms 
provides a secure way to communicate 
provides a method of validation 
Non-repudiation Disadvantages and Advantages of Asymmetric Crypto 
...
- Exam (elaborations)
- • 6 pages •
Consists of public and private keys 
The public key is made public by publishing to a directory or installed on a computer. 
The private key is kept secret 
Does not involve exchanging a secret key or key exchange 
The public key is used to encrypt messages only the recipients private key can decrypt 
Asymmetric Cryptography 
Slower then Symmetric algorithms 
provides a secure way to communicate 
provides a method of validation 
Non-repudiation Disadvantages and Advantages of Asymmetric Crypto 
...
Intro to Cryptography WGU C839 Module 1 Already Passed
Most primitive of cryptographic algorithms, substitutes one character of cipher text for each 
character of plain text. Includes 
Caesar Cipher 
Atbash Cipher 
Affine Cipher 
Rot13 Cipher Mono-Alphabet Substitution 
First used by Julius Caesar 
Every letter is shifted a fixed number of spaces to the left or right the alphabet. Caesar Cipher 
Hebrew Code 
substitutes the first letter of the alphabet for the last, and the second letter for the second to last. 
Simply reverses the alphabet Atbash C...
- Exam (elaborations)
- • 4 pages •
Most primitive of cryptographic algorithms, substitutes one character of cipher text for each 
character of plain text. Includes 
Caesar Cipher 
Atbash Cipher 
Affine Cipher 
Rot13 Cipher Mono-Alphabet Substitution 
First used by Julius Caesar 
Every letter is shifted a fixed number of spaces to the left or right the alphabet. Caesar Cipher 
Hebrew Code 
substitutes the first letter of the alphabet for the last, and the second letter for the second to last. 
Simply reverses the alphabet Atbash C...
WGU C427 Technology Applications in Healthcare – Already Passed
HMIS Health Management Information Systems 
ePHI Electronic Personal Health Information 
HMIS Moving toward creating electronic health records (EHR) has put pressure on 
organizations to expedite methods to share the information across ___. 
language 
interface 
vendors Health Management Information Systems experience information exchange 
challenges from: 
1. Lack of common technical ___________ 
2. Lack of common _______ among various healthcare information systems 
3. An inability to share da...
- Exam (elaborations)
- • 7 pages •
HMIS Health Management Information Systems 
ePHI Electronic Personal Health Information 
HMIS Moving toward creating electronic health records (EHR) has put pressure on 
organizations to expedite methods to share the information across ___. 
language 
interface 
vendors Health Management Information Systems experience information exchange 
challenges from: 
1. Lack of common technical ___________ 
2. Lack of common _______ among various healthcare information systems 
3. An inability to share da...
System Administration and IT Infrastructure Services. Week Questions and Answers Already Solved
Which of the following can be a responsibility of a systems administrator? 
setting up new user accounts and machines 
maintaining servers 
troubleshooting user issues 
all of the above all of the above; A systems administrator has a wide range of responsibilities; 
this can include, but is not limited to, setting up new user accounts and machines; maintaining 
servers; and troubleshooting user issues. 
Which of the following make up IT infrastructure? 
hardware and software 
network 
operating ...
- Exam (elaborations)
- • 5 pages •
Which of the following can be a responsibility of a systems administrator? 
setting up new user accounts and machines 
maintaining servers 
troubleshooting user issues 
all of the above all of the above; A systems administrator has a wide range of responsibilities; 
this can include, but is not limited to, setting up new user accounts and machines; maintaining 
servers; and troubleshooting user issues. 
Which of the following make up IT infrastructure? 
hardware and software 
network 
operating ...
System Administration and IT Infrastructure Services Questions and Answers 100% Pass
What encompasses the software, hardware, network, and services required for an organization to 
operate in an enterprise IT environment? IT infrastructure 
Software or a machine that provides services to other software or machines Server 
What are the three most common server form factors? Tower, Rack, and Blade 
What does KVM stand for? Keyboard Video Mouse 
What can be connected to multiple computers, and allows someone to use those computers with 
one keyboard, one mouse, and one monitor? KVM...
- Exam (elaborations)
- • 14 pages •
What encompasses the software, hardware, network, and services required for an organization to 
operate in an enterprise IT environment? IT infrastructure 
Software or a machine that provides services to other software or machines Server 
What are the three most common server form factors? Tower, Rack, and Blade 
What does KVM stand for? Keyboard Video Mouse 
What can be connected to multiple computers, and allows someone to use those computers with 
one keyboard, one mouse, and one monitor? KVM...
System Administration and IT Infrastructure Services. Week 5: Data Recovery and Backups Solved Correctly
How can you recover from an unexpected data loss event? Check all that apply Recover data 
from damaged devices; If a hard drive or device becomes damaged or fails, you can attempt to 
recover data using specialized software. If data becomes corrupt or gets deleted, you can also 
restore the data from backup. 
restore data from backups 
Where is it best to store backups, physically? across multiple locations; backups should be 
stored in multiple physical locations to reduce the risk of a catast...
- Exam (elaborations)
- • 6 pages •
How can you recover from an unexpected data loss event? Check all that apply Recover data 
from damaged devices; If a hard drive or device becomes damaged or fails, you can attempt to 
recover data using specialized software. If data becomes corrupt or gets deleted, you can also 
restore the data from backup. 
restore data from backups 
Where is it best to store backups, physically? across multiple locations; backups should be 
stored in multiple physical locations to reduce the risk of a catast...
System Administration and IT Infrastructure Services. Week 6: Final Project Solved Correctly
You're doing systems administration work for Network Funtime Company. Evaluate their current 
IT infrastructure needs and limitations, then provide at least five process improvements and 
rationale behind those improvements. Write a 200-400 word process review for this consultation. 
Remember, there's no right or wrong answer, but make sure to provide your reasoning. 
Software Company: 
Network Funtime Company is a small company that builds open-source software. The company 
is made up softwar...
- Exam (elaborations)
- • 3 pages •
You're doing systems administration work for Network Funtime Company. Evaluate their current 
IT infrastructure needs and limitations, then provide at least five process improvements and 
rationale behind those improvements. Write a 200-400 word process review for this consultation. 
Remember, there's no right or wrong answer, but make sure to provide your reasoning. 
Software Company: 
Network Funtime Company is a small company that builds open-source software. The company 
is made up softwar...
System Administration and IT Infrastructure Services. Week 6: Final Project Solved Correctly
You're doing systems administration work for Network Funtime Company. Evaluate their current 
IT infrastructure needs and limitations, then provide at least five process improvements and 
rationale behind those improvements. Write a 200-400 word process review for this consultation. 
Remember, there's no right or wrong answer, but make sure to provide your reasoning. 
Software Company: 
Network Funtime Company is a small company that builds open-source software. The company 
is made up softwar...
- Exam (elaborations)
- • 3 pages •
You're doing systems administration work for Network Funtime Company. Evaluate their current 
IT infrastructure needs and limitations, then provide at least five process improvements and 
rationale behind those improvements. Write a 200-400 word process review for this consultation. 
Remember, there's no right or wrong answer, but make sure to provide your reasoning. 
Software Company: 
Network Funtime Company is a small company that builds open-source software. The company 
is made up softwar...
System Administration and IT Infrastructure Services. Week 4: Directory Services Already Passed
What does a directory server provide? a lookup service for an organization; A directory service 
allows members of an organization to lookup information about the organization, like network 
resources and their addresses. 
What benefits does replication provide? Check all that apply. redundancy; Directory server 
replication grants you redundancy by having multiple copies of the database being served by 
multiple servers. The added servers that provide lookup services also reduce the latency for...
- Exam (elaborations)
- • 8 pages •
What does a directory server provide? a lookup service for an organization; A directory service 
allows members of an organization to lookup information about the organization, like network 
resources and their addresses. 
What benefits does replication provide? Check all that apply. redundancy; Directory server 
replication grants you redundancy by having multiple copies of the database being served by 
multiple servers. The added servers that provide lookup services also reduce the latency for...
System Administration and IT Infrastructure Service Latest 2022
Contains a lookup service that provides mapping between network resources and their network 
addresses Directory Server 
Active Directory stores a ____________________________ of the password. One-way 
cryptographic hash 
This method of authentication can employ the help of security protocols like TLS. Requires the 
client and the directory server to authenticate using some method. One of the most common 
methods is using Kerberos. SASL Authentication. 
Passwords can be easily turned into a ____...
- Exam (elaborations)
- • 7 pages •
Contains a lookup service that provides mapping between network resources and their network 
addresses Directory Server 
Active Directory stores a ____________________________ of the password. One-way 
cryptographic hash 
This method of authentication can employ the help of security protocols like TLS. Requires the 
client and the directory server to authenticate using some method. One of the most common 
methods is using Kerberos. SASL Authentication. 
Passwords can be easily turned into a ____...