100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
ICTL || All Correct. €20,01   In winkelwagen

Tentamen (uitwerkingen)

ICTL || All Correct.

 6 keer bekeken  0 keer verkocht
  • Vak
  • ICTL
  • Instelling
  • ICTL

Hashing algorithm correct answers a tool that ensures data integrity by taking binary data and producing a fixed-length representation called the hash value or message digest backbone correct answers The part of a network to which segments and significant shared devices (such as routers, switche...

[Meer zien]

Voorbeeld 4 van de 100  pagina's

  • 9 oktober 2024
  • 100
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • ICTL
  • ICTL
avatar-seller
ICTL || All Correct.
Hashing algorithm correct answers a tool that ensures data integrity by taking binary data and
producing a fixed-length representation called the hash value or message digest

backbone correct answers The part of a network to which segments and significant shared
devices (such as routers, switches, and servers) connect.

The implementation of an IA operational baseline will be an incremental process of doing what?
correct answers Protecting critical assets

One of the jobs of the kernel is to: correct answers - Manage the system's resources

Five nines correct answers when the system and services are available 99,999% of the time

Antivirus protection correct answers antimalware program that continuously monitors for viruses

Cryptology correct answers the study of codes, or the art of writing and solving them

Computer Software correct answers a set of instructions that directs the computer in how to
complete a task

Methods used to ensure high availability correct answers - eliminate single points of failure
- design for reliability
- detect failures as they occur

convergence correct answers The use of data networks to carry voice (or telephone), video, and
other communications services in addition to data.

According to DoD 8570.01-M, the IA (Information Assurance) technical category consists of
how many levels? correct answers I, II, & III

ICMP (Internet Control Message Protocol) correct answers Used by a router to exchange
information with other routers

MD5 algorithm correct answers a hash function developed by Ron Rivest that produces a 128-bit
hash value

Unix is: correct answers - A trademark
- An operating system

An internet correct answers a network of computer networks

data packet correct answers A discrete unit of information sent from one node on a network to
another.

,Linux is written in: correct answers C

Which tool would be most effective for mapping a target network? correct answers Vulnerability
scanner

Configuration Management correct answers The process of keeping track of changes to the
system, if needed, approving them.

Boolean Search correct answers uses logical operators such as AND, OR, and NOT to link the
words you are searching for

Switch correct answers Use the SWITCH statement when many blocks of code are being
executed.

file server correct answers A specialized server that enables clients to share applications and data
across
the network.

Source code refers to: correct answers A human readable version of computer software

Packet Sniffer correct answers A device or program that monitors the data traveling between
computers on a network

Confidentiality correct answers prevents the disclosure of information to
unauthorized people, resources and processes

Loops correct answers Use when running the same code over and over again, each time with a
different value.

What is the best protection method for sharing Personally Identifiable Information (PII)? correct
answers Digitally sign and encrypt the email.

HMAC (Hash-based Message Authentication Code) correct answers they strengthens hashing
algorithms by using an additional secret key as input to the hash function

host correct answers A computer that enables resource sharing by other computers on the same
network

Public Domain correct answers works that are not restricted by copyright; they are owned by the
public and can be freely used

Ransomware correct answers holds a computer system or the data it contains captive until the
target makes a payment

Internet Service Providers correct answers provide an access path to the Internet

,Methods used to ensure confidentiality correct answers data encryption, authentication, and
access control.

3DES (Triple Data Encryption Algorithm) correct answers a symmetric block cipher with 64-bit
block size that uses a 56-bit key, encrypts data three times and uses a different key for at least
one of the three passes, giving it a cumulative key size of 112-168 bits

Script Kiddies correct answers teenagers or hobbyists mostly limited to pranks
and vandalism, have little or no skill, often using existing tools or instructions found on the
Internet to launch attacks.

Most of the tools that are part of Linux systems come from: correct answers The GNU (GNU's
Not Unix!) project

While Loop correct answers loops through a block of code while a specified condition is true

Vulnerability Brokers correct answers grey hat hackers who attempt to discover
exploits and report them to vendors, sometimes for prizes or rewards

Having reviewed DoD Wireless STIG (Ver6, Release 1), Sarah learns she may only utilize
SecNet 54 and ______________ for transmitting classified information up to Top Secret. correct
answers KOV-26 Talon

Risk Analysis correct answers The process of identifying security risks, determining their
magnitude, and identifying areas needing safeguards

Digital certificate correct answers it enable users, hosts, and organizations to exchange
information securely over the Internet

The Linux platform that runs on mobile phones is called: correct answers Android

3D Spreadsheets correct answers enable you to link multiple worksheets together

Authorization correct answers services that determine which
resources users can access, along with the operations that users can perform, after the user is
granted access once authentication is complete

Hacktivists correct answers grey hat hackers who rally and protest against
different political and social ideas

What does a distribution provide to add and remove software from the system? correct answers
Package manager

Antivirus software installed to scan and monitor malware activities on a server or workstation
would be identified as a __________ based intrusion detection/prevention system. correct
answers Host

, license tracking correct answers The process of determining the number of copies of a single
application that are currently in use on the network and whether the number in use exceeds the
authorized number of licenses

load balancing correct answers The process of distributing data transfer activity evenly across a
network so that no single device is overwhelmed.

Which of the following is true of Internet hoaxes? correct answers They can be part of a
distributed denial-of-service (DDoS) attack.

The bootloader's job is to: correct answers Load the kernel after the computer is powered on

Entity integrity correct answers a database integrity that state that all rows must have a unique
identifier called a primary key

File access control correct answers consists of permissions that limit folder or file access for an
individual or for a group of users

Add-On correct answers is specific to a type of browser and adds functionality to the browser

State Sponsored Hackers correct answers depending on a person's perspective, these are either
white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage
networks

Methods used to ensure data integrity correct answers hashing, data validation checks, data
consistency checks, and access controls

System resiliency correct answers capability to maintain availability of data and operational
processing despite attacks or disrupting event

NIC (Network Interface Controller/Card) correct answers A piece of hardware that allows a
computer to connect to a network

Unix was originally invented at: correct answers AT&T Bell Labs

NOS (network operating system) correct answers a specialized operating system for a network
device such as a router, switch or firewall

A type of attack where the intruder observes authentication secrets such as a combination or PIN:
correct answers Shoulder Surfing

Methods used to ensure availability correct answers system redundancy, system
backups, increased system resiliency, equipment maintenance, up-to-date
operating systems and software, and plans in place to recover quickly from unforeseen disasters.

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

√  	Verzekerd van kwaliteit door reviews

√ Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper FullyFocus. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €20,01. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 75632 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€20,01
  • (0)
  Kopen