100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU- D322 Intro to IT Test Questions and Answers All Correct $13.09   Add to cart

Exam (elaborations)

WGU- D322 Intro to IT Test Questions and Answers All Correct

 15 views  0 purchase
  • Course
  • WGU- D322 Intro to IT
  • Institution
  • WGU- D322 Intro To IT

WGU- D322 Intro to IT Test Questions and Answers All Correct Strategic risk analysis - Answer-security policies are translated into mechanisms which support information security. We will focus on the risk management process Social engineering - Answer-threat that targets users. Phishing - An...

[Show more]

Preview 2 out of 10  pages

  • August 22, 2024
  • 10
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU- D322 Intro to IT
  • WGU- D322 Intro to IT
avatar-seller
Scholarsstudyguide
WGU- D322 Intro to IT Test Questions
and Answers All Correct

Strategic risk analysis - Answer-security policies are translated into mechanisms which
support information security. We will focus on the risk management process

Social engineering - Answer-threat that targets users.

Phishing - Answer-is the process of targeting a specific individual, usually via email,
under the guise of a reputable or trustworthy entity to reveal private or personal details
such as usernames or password

Hacking - Answer-is when an individual obtains unauthorized access to a host

Malware - Answer-"malicious" software

Spyware - Answer-is often downloaded unknown to the user when accessing web
storages.

Denial of service (DOS) attack - Answer-In the DOS attack, one or more attackers
attempts to flood a server with so many incoming messages that the server is unable to
handle legitimate business

Firewalls - Answer-prevent certain types of messages from coming into or out of the
network and anti-viral software seeks out malware

Antivirus software - Answer-attempts to identify if a file contains a virus or, more
generally, some form of malware.

Information security - Answer-attempts to ensure the confidentiality, integrity, and
availability of information when it is stored, processed, and transmitted (across a
network)

Encryption - Answer-is the idea of obfuscating the information that resides on a
computer or is sent over a network so that if it is intercepted the hacker will be unable to
use the information. Encryption uses a mathematical algorithm for converting the plain-
text information to the encrypted form

Symmetric key encryption - Answer-uses the same key for performing the encryption
and decryption.

, Public-key encryption - Answer-uses two keys, a public and private key.

Software - Answer-is the term we use for the systems and programs that are developed,
as a result of programming and scripting efforts by individuals, to perform a business
function

Application software - - Answer-consists of programs that end users run to accomplish
tasks

System software - Answer-consists of programs that make up the operating system

Server software - Answer-works with hardware to provide a network service

Cloud computing - Answer-combines several different technologies: distributed
computing, computer networks, and storage area networks. The idea is to offer, as a
service, the ability to offload computation and storage from your local computer to the
cloud

Operating system (OS) - Answer-is a program. Its primary task is to allow a computer
user to easily access the hardware and software of a computer system. Beyond this, we
might say that an OS is required to maintain the computer's environment. (Windows
7/8/10, Linux,and Mac OS X., Android, Windows, and iOS)

Operating System Components
(System software) - Answer-User
Applications
OS utilities
Services
Shells
OS Kernel
Software device drivers
OM BIOS drivers
Hardware

Kernel - Answer-The core components of the operating system

Device drivers - Answer-provide specific interfaces between the OS running a computer
and hardware

Shell - Answer-an interface for the user, often personalized for that given user

System utilities - Answer-programs that allow the user to monitor and improve system
performance.

GUI - Answer-allows a user to control the computer by using the mouse and pointing
and clicking at objects on the screen (icons, menus, buttons, etc.).

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.09. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72042 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.09
  • (0)
  Add to cart