100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ICTL EXAM TEST BANK QUESTIONS AND ANSWERS 2024 $17.99   Add to cart

Exam (elaborations)

ICTL EXAM TEST BANK QUESTIONS AND ANSWERS 2024

 0 view  0 purchase
  • Course
  • ICTL
  • Institution
  • ICTL

ICTL EXAM TEST BANK QUESTIONS AND ANSWERS 2024

Preview 4 out of 203  pages

  • November 14, 2024
  • 203
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ICTL
  • ICTL
avatar-seller
Teacher101
ICTL EXAM TEST BANK


What can be done to prevent remote people from running programs on your
computer? - ANSWERS-- Turn on a firewall

- Use strong passwords on all user accounts



network address translation (NAT) - ANSWERS-The process of changing an IP
address while it is in transit across a router. This is usually so one larger address
space (private) can be remapped to another address space, or single IP address
(public).

- An internet standard which connects the internet to a private network while
maintaining privacy.

- This is used to translate one IP addressing system with another that is not
necessarily compatible.



Terminal Access Controller Access-Control System (TACACS) - ANSWERS-A remote
authentication protocol similar to RADIUS used more often in UNIX networks.



circuit-level gateway - ANSWERS-Works at the Session Layer of the OSI model and
applies security mechanisms when a TCP or UDP connection is established; they
act as a go-between for the Transport and Application Layers in TCP/IP.



Write head - ANSWERS-Used to write data to magnetic storage

,Which of the following is provided by a graphical interface that isn't normally
provided to a non graphical interface? - ANSWERS-- Windows

- Menus

- Popups

- Desktop



network intrusion prevention system (NIPS) - ANSWERS-Designed to inspect
traffic, and based on its configuration or security policy, the system can remove,
detain, or redirect malicious traffic.



Bandwidth - ANSWERS-The amount of data that can be transmitted over a
network in a given amount of time.



Packet Fields - ANSWERS-At each layer there is the header field; used for
transmission within that layer

And a payload field; used within the above layers



content filters - ANSWERS-Individual computer programs that block external files
that use JavaScript or images from loading into the browser.



L2TP (Layer 2 Tunneling Protocol) - ANSWERS-A VPN protocol that lacks security

features, such as encryption. However, it can still be used for a secure VPN
connection if it is combined with another protocol that provides encryption.

,Attack - ANSWERS-Intentional act of attempting to bypass one or more computer
security controls.



IDS (Intrusion Detection System) - ANSWERS-passively monitors the traffic on a
network. can recognize the signature of a well-known attack and respond to stop
the attack. However, this sensor does not reside in-line with the traffic flow.
Therefore, one or more malicious packets might reach an intended victim before
the traffic flow is stopped by this sensor.



Read head - ANSWERS-Used to read data on magnetic storage



Tickets - ANSWERS-Part of the authentication process used by Kerberos.



symmetric encryption - ANSWERS-both the sender and receiver of a packet use
the same key (a shared key ) for encryption and decryption.



Security Plan - ANSWERS-Document that details the security controls established
and planned for a particular system.



Cloud storage - ANSWERS-third party storage of data- using someone else's
servers.

, SNMP agent - ANSWERS-Software deployed by the network management system
that is loaded on managed devices. The software redirects the information that
the NMS needs to monitor the remote managed devices.



Tier-1 ISP - ANSWERS-Are national ISPs that connect together and exchange data
at NAPs.



Transport Layer Security (TLS) - ANSWERS-The successor to SSL. Provides secure
Internet communications. This is shown in a browser as HTTPS.



Network Management System (NMS) - ANSWERS-The software run on one or
more servers that controls the monitoring of network attached devices and
computers.



Hashing algorithm - ANSWERS-a tool that ensures data integrity by taking binary
data and producing a fixed-length representation called the hash value or
message digest



backbone - ANSWERS-The part of a network to which segments and significant
shared devices (such as routers, switches, and servers) connect.



The implementation of an IA operational baseline will be an incremental process
of doing what? - ANSWERS-Protecting critical assets



One of the jobs of the kernel is to: - ANSWERS-- Manage the system's resources

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Teacher101. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77858 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
  Add to cart