100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
WGU- D322 Intro to IT Test Questions and Answers All Correct €12,69   In winkelwagen

Tentamen (uitwerkingen)

WGU- D322 Intro to IT Test Questions and Answers All Correct

 11 keer bekeken  0 keer verkocht
  • Vak
  • WGU- D322 Intro to IT
  • Instelling
  • WGU- D322 Intro To IT

WGU- D322 Intro to IT Test Questions and Answers All Correct Strategic risk analysis - Answer-security policies are translated into mechanisms which support information security. We will focus on the risk management process Social engineering - Answer-threat that targets users. Phishing - An...

[Meer zien]

Voorbeeld 2 van de 10  pagina's

  • 22 augustus 2024
  • 10
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • WGU- D322 Intro to IT
  • WGU- D322 Intro to IT
avatar-seller
WGU- D322 Intro to IT Test Questions
and Answers All Correct

Strategic risk analysis - Answer-security policies are translated into mechanisms which
support information security. We will focus on the risk management process

Social engineering - Answer-threat that targets users.

Phishing - Answer-is the process of targeting a specific individual, usually via email,
under the guise of a reputable or trustworthy entity to reveal private or personal details
such as usernames or password

Hacking - Answer-is when an individual obtains unauthorized access to a host

Malware - Answer-"malicious" software

Spyware - Answer-is often downloaded unknown to the user when accessing web
storages.

Denial of service (DOS) attack - Answer-In the DOS attack, one or more attackers
attempts to flood a server with so many incoming messages that the server is unable to
handle legitimate business

Firewalls - Answer-prevent certain types of messages from coming into or out of the
network and anti-viral software seeks out malware

Antivirus software - Answer-attempts to identify if a file contains a virus or, more
generally, some form of malware.

Information security - Answer-attempts to ensure the confidentiality, integrity, and
availability of information when it is stored, processed, and transmitted (across a
network)

Encryption - Answer-is the idea of obfuscating the information that resides on a
computer or is sent over a network so that if it is intercepted the hacker will be unable to
use the information. Encryption uses a mathematical algorithm for converting the plain-
text information to the encrypted form

Symmetric key encryption - Answer-uses the same key for performing the encryption
and decryption.

, Public-key encryption - Answer-uses two keys, a public and private key.

Software - Answer-is the term we use for the systems and programs that are developed,
as a result of programming and scripting efforts by individuals, to perform a business
function

Application software - - Answer-consists of programs that end users run to accomplish
tasks

System software - Answer-consists of programs that make up the operating system

Server software - Answer-works with hardware to provide a network service

Cloud computing - Answer-combines several different technologies: distributed
computing, computer networks, and storage area networks. The idea is to offer, as a
service, the ability to offload computation and storage from your local computer to the
cloud

Operating system (OS) - Answer-is a program. Its primary task is to allow a computer
user to easily access the hardware and software of a computer system. Beyond this, we
might say that an OS is required to maintain the computer's environment. (Windows
7/8/10, Linux,and Mac OS X., Android, Windows, and iOS)

Operating System Components
(System software) - Answer-User
Applications
OS utilities
Services
Shells
OS Kernel
Software device drivers
OM BIOS drivers
Hardware

Kernel - Answer-The core components of the operating system

Device drivers - Answer-provide specific interfaces between the OS running a computer
and hardware

Shell - Answer-an interface for the user, often personalized for that given user

System utilities - Answer-programs that allow the user to monitor and improve system
performance.

GUI - Answer-allows a user to control the computer by using the mouse and pointing
and clicking at objects on the screen (icons, menus, buttons, etc.).

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Scholarsstudyguide. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €12,69. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 81113 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€12,69
  • (0)
  Kopen