ICTL
Hashing algorithm - answer a tool that ensures data integrity by taking binary data and
producing a fixed-length representation called the hash value or message digest
backbone - answer The part of a network to which segments and significant shared
devices (such as routers, switches, and servers) connect.
The implementation of an IA operational baseline will be an incremental process of
doing what? - answer Protecting critical assets
One of the jobs of the kernel is to: - answer- Manage the system's resources
Five nines - answer when the system and services are available 99,999% of the time
Antivirus protection - answer antimalware program that continuously monitors for
viruses
Cryptology - answer the study of codes, or the art of writing and solving them
Computer Software - answera set of instructions that directs the computer in how to
complete a task
Methods used to ensure high availability - answer- eliminate single points of failure
- design for reliability
- detect failures as they occur
convergence - answerThe use of data networks to carry voice (or telephone), video, and
other communications services in addition to data.
According to DoD 8570.01-M, the IA (Information Assurance) technical category
consists of how many levels? - answerI, II, & III
ICMP (Internet Control Message Protocol) - answerUsed by a router to exchange
information with other routers
MD5 algorithm - answera hash function developed by Ron Rivest that produces a 128-
bit hash value
Unix is: - answer- A trademark
- An operating system
,An internet - answera network of computer networks
data packet - answerA discrete unit of information sent from one node on a network to
another.
Linux is written in: - answerC
Which tool would be most effective for mapping a target network? - answerVulnerability
scanner
Configuration Management - answerThe process of keeping track of changes to the
system, if needed, approving them.
Boolean Search - answeruses logical operators such as AND, OR, and NOT to link the
words you are searching for
Switch - answerUse the SWITCH statement when many blocks of code are being
executed.
file server - answerA specialized server that enables clients to share applications and
data across
the network.
Source code refers to: - answerA human readable version of computer software
Packet Sniffer - answerA device or program that monitors the data traveling between
computers on a network
Confidentiality - answerprevents the disclosure of information to
unauthorized people, resources and processes
Loops - answerUse when running the same code over and over again, each time with a
different value.
What is the best protection method for sharing Personally Identifiable Information (PII)?
- answerDigitally sign and encrypt the email.
HMAC (Hash-based Message Authentication Code) - answerthey strengthens hashing
algorithms by using an additional secret key as input to the hash function
host - answerA computer that enables resource sharing by other computers on the
same network
Public Domain - answerworks that are not restricted by copyright; they are owned by the
public and can be freely used
,Ransomware - answerholds a computer system or the data it contains captive until the
target makes a payment
Internet Service Providers - answerprovide an access path to the Internet
Methods used to ensure confidentiality - answerdata encryption, authentication, and
access control.
3DES (Triple Data Encryption Algorithm) - answera symmetric block cipher with 64-bit
block size that uses a 56-bit key, encrypts data three times and uses a different key for
at least one of the three passes, giving it a cumulative key size of 112-168 bits
Script Kiddies - answerteenagers or hobbyists mostly limited to pranks
and vandalism, have little or no skill, often using existing tools or instructions found on
the Internet to launch attacks.
Most of the tools that are part of Linux systems come from: - answerThe GNU (GNU's
Not Unix!) project
While Loop - answerloops through a block of code while a specified condition is true
Vulnerability Brokers - answergrey hat hackers who attempt to discover
exploits and report them to vendors, sometimes for prizes or rewards
Having reviewed DoD Wireless STIG (Ver6, Release 1), Sarah learns she may only
utilize SecNet 54 and ______________ for transmitting classified information up to Top
Secret. - answerKOV-26 Talon
Risk Analysis - answerThe process of identifying security risks, determining their
magnitude, and identifying areas needing safeguards
Digital certificate - answerit enable users, hosts, and organizations to exchange
information securely over the Internet
The Linux platform that runs on mobile phones is called: - answerAndroid
3D Spreadsheets - answerenable you to link multiple worksheets together
Authorization - answerservices that determine which
resources users can access, along with the operations that users can perform, after the
user is granted access once authentication is complete
Hacktivists - answergrey hat hackers who rally and protest against
different political and social ideas
, What does a distribution provide to add and remove software from the system? -
answerPackage manager
Antivirus software installed to scan and monitor malware activities on a server or
workstation would be identified as a __________ based intrusion detection/prevention
system. - answerHost
license tracking - answerThe process of determining the number of copies of a single
application that are currently in use on the network and whether the number in use
exceeds the authorized number of licenses
load balancing - answerThe process of distributing data transfer activity evenly across a
network so that no single device is overwhelmed.
Which of the following is true of Internet hoaxes? - answerThey can be part of a
distributed denial-of-service (DDoS) attack.
The bootloader's job is to: - answerLoad the kernel after the computer is powered on
Entity integrity - answera database integrity that state that all rows must have a unique
identifier called a primary key
File access control - answerconsists of permissions that limit folder or file access for an
individual or for a group of users
Add-On - answeris specific to a type of browser and adds functionality to the browser
State Sponsored Hackers - answerdepending on a person's perspective, these are
either white hat or black hat hackers who steal government secrets, gather intelligence,
and sabotage networks
Methods used to ensure data integrity - answerhashing, data validation checks, data
consistency checks, and access controls
System resiliency - answercapability to maintain availability of data and operational
processing despite attacks or disrupting event
NIC (Network Interface Controller/Card) - answerA piece of hardware that allows a
computer to connect to a network
Unix was originally invented at: - answerAT&T Bell Labs
NOS (network operating system) - answera specialized operating system for a network
device such as a router, switch or firewall
Hashing algorithm - answer a tool that ensures data integrity by taking binary data and
producing a fixed-length representation called the hash value or message digest
backbone - answer The part of a network to which segments and significant shared
devices (such as routers, switches, and servers) connect.
The implementation of an IA operational baseline will be an incremental process of
doing what? - answer Protecting critical assets
One of the jobs of the kernel is to: - answer- Manage the system's resources
Five nines - answer when the system and services are available 99,999% of the time
Antivirus protection - answer antimalware program that continuously monitors for
viruses
Cryptology - answer the study of codes, or the art of writing and solving them
Computer Software - answera set of instructions that directs the computer in how to
complete a task
Methods used to ensure high availability - answer- eliminate single points of failure
- design for reliability
- detect failures as they occur
convergence - answerThe use of data networks to carry voice (or telephone), video, and
other communications services in addition to data.
According to DoD 8570.01-M, the IA (Information Assurance) technical category
consists of how many levels? - answerI, II, & III
ICMP (Internet Control Message Protocol) - answerUsed by a router to exchange
information with other routers
MD5 algorithm - answera hash function developed by Ron Rivest that produces a 128-
bit hash value
Unix is: - answer- A trademark
- An operating system
,An internet - answera network of computer networks
data packet - answerA discrete unit of information sent from one node on a network to
another.
Linux is written in: - answerC
Which tool would be most effective for mapping a target network? - answerVulnerability
scanner
Configuration Management - answerThe process of keeping track of changes to the
system, if needed, approving them.
Boolean Search - answeruses logical operators such as AND, OR, and NOT to link the
words you are searching for
Switch - answerUse the SWITCH statement when many blocks of code are being
executed.
file server - answerA specialized server that enables clients to share applications and
data across
the network.
Source code refers to: - answerA human readable version of computer software
Packet Sniffer - answerA device or program that monitors the data traveling between
computers on a network
Confidentiality - answerprevents the disclosure of information to
unauthorized people, resources and processes
Loops - answerUse when running the same code over and over again, each time with a
different value.
What is the best protection method for sharing Personally Identifiable Information (PII)?
- answerDigitally sign and encrypt the email.
HMAC (Hash-based Message Authentication Code) - answerthey strengthens hashing
algorithms by using an additional secret key as input to the hash function
host - answerA computer that enables resource sharing by other computers on the
same network
Public Domain - answerworks that are not restricted by copyright; they are owned by the
public and can be freely used
,Ransomware - answerholds a computer system or the data it contains captive until the
target makes a payment
Internet Service Providers - answerprovide an access path to the Internet
Methods used to ensure confidentiality - answerdata encryption, authentication, and
access control.
3DES (Triple Data Encryption Algorithm) - answera symmetric block cipher with 64-bit
block size that uses a 56-bit key, encrypts data three times and uses a different key for
at least one of the three passes, giving it a cumulative key size of 112-168 bits
Script Kiddies - answerteenagers or hobbyists mostly limited to pranks
and vandalism, have little or no skill, often using existing tools or instructions found on
the Internet to launch attacks.
Most of the tools that are part of Linux systems come from: - answerThe GNU (GNU's
Not Unix!) project
While Loop - answerloops through a block of code while a specified condition is true
Vulnerability Brokers - answergrey hat hackers who attempt to discover
exploits and report them to vendors, sometimes for prizes or rewards
Having reviewed DoD Wireless STIG (Ver6, Release 1), Sarah learns she may only
utilize SecNet 54 and ______________ for transmitting classified information up to Top
Secret. - answerKOV-26 Talon
Risk Analysis - answerThe process of identifying security risks, determining their
magnitude, and identifying areas needing safeguards
Digital certificate - answerit enable users, hosts, and organizations to exchange
information securely over the Internet
The Linux platform that runs on mobile phones is called: - answerAndroid
3D Spreadsheets - answerenable you to link multiple worksheets together
Authorization - answerservices that determine which
resources users can access, along with the operations that users can perform, after the
user is granted access once authentication is complete
Hacktivists - answergrey hat hackers who rally and protest against
different political and social ideas
, What does a distribution provide to add and remove software from the system? -
answerPackage manager
Antivirus software installed to scan and monitor malware activities on a server or
workstation would be identified as a __________ based intrusion detection/prevention
system. - answerHost
license tracking - answerThe process of determining the number of copies of a single
application that are currently in use on the network and whether the number in use
exceeds the authorized number of licenses
load balancing - answerThe process of distributing data transfer activity evenly across a
network so that no single device is overwhelmed.
Which of the following is true of Internet hoaxes? - answerThey can be part of a
distributed denial-of-service (DDoS) attack.
The bootloader's job is to: - answerLoad the kernel after the computer is powered on
Entity integrity - answera database integrity that state that all rows must have a unique
identifier called a primary key
File access control - answerconsists of permissions that limit folder or file access for an
individual or for a group of users
Add-On - answeris specific to a type of browser and adds functionality to the browser
State Sponsored Hackers - answerdepending on a person's perspective, these are
either white hat or black hat hackers who steal government secrets, gather intelligence,
and sabotage networks
Methods used to ensure data integrity - answerhashing, data validation checks, data
consistency checks, and access controls
System resiliency - answercapability to maintain availability of data and operational
processing despite attacks or disrupting event
NIC (Network Interface Controller/Card) - answerA piece of hardware that allows a
computer to connect to a network
Unix was originally invented at: - answerAT&T Bell Labs
NOS (network operating system) - answera specialized operating system for a network
device such as a router, switch or firewall