100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU d322 Exam Questions with Correct Answers $12.49   Add to cart

Exam (elaborations)

WGU d322 Exam Questions with Correct Answers

 6 views  0 purchase
  • Course
  • WGU d322
  • Institution
  • WGU D322

WGU d322 Exam Questions with Correct Answers Network Server - Answer-Dedicated, high performance computer with large hard disk drives. It may be in a cabinet so multiple servers can be housed. **Stand alone computer, not a desktop. Information Security Assurance Goals - Answer-"CIA" 1. Co...

[Show more]

Preview 2 out of 9  pages

  • August 20, 2024
  • 9
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU d322
  • WGU d322
avatar-seller
Scholarsstudyguide
WGU d322 Exam Questions with
Correct Answers
Network Server - Answer-Dedicated, high performance computer with large hard disk
drives. It may be in a cabinet so multiple servers can be housed.
**Stand alone computer, not a desktop.

Information Security Assurance Goals - Answer-"CIA"
1. Confidentiality
2. Integrity
3. Availability

IAS Confidentiality - Answer-Requires data be kept secure so that it does not fall to
unauthorized users.
It goes beyond security measures and extends to policies.
Security measures should extend beyond network. A stolen laptop should not violate
confidentiality.

IAS Integrity - Answer-Requires data are correct.
Requires 3 different efforts:
1. Data gathering should include an accuracy component.
2. Data must be entered into system accurately.
3. Once data is in dB, changes made will leave a record of when the change was made
and by whom.

IAS Availability - Answer-Requires data/information be available when needed.

Steps of Strategic Risk Analysis - Answer-1.Identify organization information assets.
2. Identify vulnerabilities.
3.Identify threats.
4.Implement policies.

Social Engineering - Answer-Targets users directly, could include calling and asking for
password because there is an issue. Could also include phishing, which involves emails
that will redirect to a malicious website.

SQL Injection - Answer-Hacker issues a SQL command to web server as part of URL.
B/c web server is not expecting SQL command, may pass SQL command to database.
Malicious SQL command may then do damage.

Buffer Overflow - Answer-Most well known type of software injection attack.

, Because buffer is limited in size, if software doesn't ensure insertions in buffer are
limited in size, sufficient amounts of malicious code could overflow buffer. Malicious
overflow code could then be stored in memory and run to perform operations inserted
by hacker.

Packet Sniffing - Answer-Means of obtaining a password or anything sent over network
without encryption.

Computer Science - Answer-Computer science is the study of computers and
computational systems.

Repeater - Answer-Passes signals back and forth between two buses without
considering the meaning of the signals.

Bridge - Answer-Only forwards messages addressed to a computer on the other side.

PAN - Answer-A Personal Area Network (PAN) is normally used for short-range
communications, within a few feet, such as wireless headphones to a smartphone or a
wireless mouse to a PC.

LAN - Answer-Local Area Networks (LANs) consist of a collection of computers in a
single building or building complex.

WAN - Answer-Wide Area Networks (WANs) link systems over a greater distance,
including machines on the opposite sides of the world.

Distributed Systems - Answer-Distributed systems execute software as processes on
more than one computer. Examples include: cluster computer, cloud computing and grid
computing.

Wireless Transmission - Answer-Light waves of different frequencies, such as infrared
or radio waves, can be used to transmit data within a network with the use of Wi-Fi,
Bluetooth, or even near field communication. These radio waves are what is used to
carry radio signals far distances to other networked devices.

Compiler - Answer-A compiler translates source code into machine language.

Interpreter - Answer-Interpreters translate and execute source code one line at a time.

Machine code - Answer-Instructions that a computer understands (i.e., in the form of 0s
and 1s).

Source code - Answer-The collection of instructions written in a programming language.

Algorithm - Answer-A step-by-step formula outlining how to execute a task.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81397 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart