HEALTH |PASSED ON FIRST ATTEMPT |LATEST UPDATE WITH
COMPLETE SOLUTION
White Hat - CORRECT ANSWERS-Ethical Hacker
Black Hat - CORRECT ANSWERS-Unethical Hacker
Bandwidth - CORRECT ANSWERS-Transfer rate permissible over the media, and is described
as bps or b/s (bits per second).
**Modern bandwidth is described in millions/billions bits per second (i.e. Mbps or Gbps)
*Older tech limited to thousands, (i.e. 56 Kbps)
Network Hub - CORRECT ANSWERS-Device that connects multiple computers together.
*Broadcasts to all connected devices, even if message is intended for just one.
Grey Hat - CORRECT ANSWERS-Both ethical and unethical at times. A fence sitter.
Packet Sniffing - CORRECT ANSWERS-Means of obtaining a password or anything sent over
network without encryption.
Productivity Software - CORRECT ANSWERS-Application software used to aid in productivity.
I.E. Presentation software, word processor, spreadsheets.
Internet Usage Software - CORRECT ANSWERS-Email, FTP client, web browser
System Software - CORRECT ANSWERS-Consists of programs that make up the OS and directly
support system itself.
**Includes services or DAEMONS
, Server Software - CORRECT ANSWERS-Works with hardware to provide network service.
Local Application - CORRECT ANSWERS-Software stored on an individual computer.
Intranet - CORRECT ANSWERS-A LAN that uses IP. Used to communicate within organization.
Cloud Computing - CORRECT ANSWERS-Allows organization to access resources/app
anywhere, anytime. Beneficial because an org. may access resources it may not normally have.
Operating Systems - CORRECT ANSWERS-Allows a user to easily access hardware/software,
required to maintain computer environment.
Application Software - CORRECT ANSWERS-Programs end users run to accomplish tasks.
Utility Programs - CORRECT ANSWERS-Allow user to monitor system performance.
Web Server - CORRECT ANSWERS-Role is to respond to HTTP requests.
*Most HTTP requests are for HTML docs, but could include any web accessible resource.
It's all combined into the URL.
**APACHE is most popular web server-can execute scripts for dynamic pages, use security mechanisms,
log request for trend tracking.
Proxy Server - CORRECT ANSWERS-Acts as a giant cache and allows pages accessed frequently
in an organization to be accessed locally.
*Also provides degree of anonymity, since IP address recorded is for proxy server and not individual
client.
*Can also be used to block requests to certain servers (i.e Facebook)
*Can reject responses that contain certain content (i.e "porn")
**SQUID is most common, but APACHE can also be used as proxy server.