QUESTIONS WITH ANSWERS GRADED A+
◍ Field.
Answer: Contains the data of an attribute for a record within a relation
◍ Dumb Terminal.
Answer: A display monitor that has no processing capabilities.
◍ Availability Risks.
Answer: Denial of Services AttackPower OutagesHardware
FailuresDestruction of Equipment Service Outages
◍ Boolean/Logical.
Answer: True/False; applying AND/OR when searching for data.
◍ IP Aliasing.
Answer: Associating more than one IP address to a network interface.
◍ Defense in Depth.
Answer: Protecting every layer that surrounds data
◍ identification.
Answer: 1stperson trying to gain accessonly a claim!
◍ System Administrator.
Answer: Maintains all aspects of the system including hardware, software,
and programming.
◍ Binary.
Answer: Uses base 2 system (0 and 1)
◍ IT Professional Roles.
Answer: Administration and Support
◍ Database Management System (DBMS).
, Answer: Used to create, manipulate, and access the data in a database
◍ 3. Provide diligent and competent service to principals.
Answer: to apply to your employer if you are a normal employee or to your
clients if you are a consultant
◍ IPOS.
Answer: The Input-Procession-Output-Storage Cycle
◍ System Software.
Answer: Consists of programs that make up the OS; software that directly
supports the computer system itself
◍ Change and Config Management.
Answer: help ensure a stable operating environment and minimizes risk to
org- hardware- software- firmware
◍ Data Validation.
Answer: Ensuring that users enter the correct data type
◍ DIKW Hierarchy.
Answer: Defines the transition of data to information from knowledge to
wisdom. (Data Information Knowledge Wisdom)
◍ Utility Programs.
Answer: Programs that allow the user to monitor and improve system
performance.
◍ Interpreted Language.
Answer: Takes the most recently entered instruction, translates it into
machine language, and executes it; must be translated manually each time.
◍ Domain Name.
Answer: Identifies the server on which the web page can be found
◍ Examples of Vulnerabilities.
Answer: -missing patches-promiscuous firewall rules-other security
misconfigs
,◍ Example of 2. Act honorably, honestly, justly, responsibly, and legally.
Answer: making an error that leads to a compromise at org then covers it up
and lies about the mistake violates this
◍ Public Domain.
Answer: Software that has been moved into the public domain; can be used
however you feel
◍ Worms.
Answer: Self contained programs that do not need other programs to
propagate across computers and computer networks
◍ Risk Impact.
Answer: amount of damage that will occur if the risk materializes
◍ Pivot.
Answer: Rotates data to view the data from a different perspective (being
able to compare different sets of facts)
◍ Wisdom in DIKW.
Answer: Provides a social setting to knowledge; an understanding of the
"why". Can only come by having both knowledge and experience.
◍ Common Steps in SDLC.
Answer: Preliminary investigation, Analysis, Logical design, Physical
design, Implementation, Maintenance
◍ Non-Repudiation.
Answer: security goal that prevents someone from falsely denying that
something is true tech: uses technical measures to ensure that a user is not
able to later deny that they took some action
◍ Accounting.
Answer: 4th allows admins to track user activity and pull it from logs
◍ The Controller.
Answer: The part of an application that interacts with the user and passes the
user requests to the model
, ◍ Packet Sniffing.
Answer: Allows you to obtain anything being sent over a network if the data
being transmitted isn't encrypted
◍ Characteristics of Quality Data.
Answer: Relevance - the data being used must apply directly to the decision
being madeTimely - data must be efficient and must be provided in a timely
manner Thorough - the data must be completeAccurate - data should be
captured only once, where possible and should be captured as close to the
point of activity as possible.Reliable - data should reflect stable and
consistent data collection processes across collections points and over time
◍ Relational Database.
Answer: Has multiple tables (relations) with interrelated fields; most
common structure for databases
◍ Password Components.
Answer: lengthcomplexityhistory(reuse)expiration
◍ authentication.
Answer: 2ndproves identity to satisfaction of access control system
◍ ETL.
Answer: Extract Transform, Load; process of extracting data, transforming it
for purposes of analysis, and loading it into the final target database.
◍ Defense in Depth Principle.
Answer: applying multiple overlapping controls to achieve some objective
◍ Compiler.
Answer: Improve language translator; requires that the components of the
software all be defined before compilation can begin; code is more effcient
◍ 2. Act honorably, honestly, justly, responsibly, and legally.
Answer: you may not break the law, lie, or commit any other dishonorable,
unjust, or irresponsible action
◍ BIOS ROM.