Upgrade to remove ads Show Only ₩37,125/year
In Class Quizzes - Lectures 22-26 Terms in this set (30)Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters. TRUE Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data. TRUE Maintaining data integrity is not a primary goal of security. FALSE A crypting service runs some custom encryption routines to obfuscate malware A Distributed DoS (DDoS) attack is often performed using a network of compromised computers It is not possible to map the traffic flow of Bitcoin transactions FALSE Decryption is the process of converting plaintext into ciphertext. FALSE Asymmetric encryption uses the same key to encrypt and decrypt a message. FALSE When using a digital signature for the process of authentication, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key. TRUE
Secure Sockets Layer SSL is the latest cryptographic protocol designed to FALSE Websites can use TLS to secure all communications between their TRUE Public key cryptography uses a private key to encrypt a piece of data, and then the recipient uses the public key to decrypt the data. FALSE A risk assessment assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. TRUE A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. threat A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed. denial of service Anomaly detection compares network characteristics against TRUE IPS is a monitoring system, while IDS is a control system. FALSE IPS systems compare the current network activity FALSE The trend toward server-side computing and the exploding popularity of Internet services has created a new class of computing systems that we have named warehouse-scale computers , or WSC. TRUE Warehouse-scale computers currently power the services offered by companies such as Google, Amazon, Facebook, and Microsoft's online services division. They differ significantly from traditional datacenters: they belong to a single organization, use a relatively homogeneous hardware and system software platform, and share a common systems management layer. TRUE The datacenters powering many of today's successful Internet services are simply a miscellaneous collection of machines co-located in a facility and wired up together. FALSE Achieving fault-free operation on a large collection of hardware and system software is made easier by the large number of servers involved. FALSE A Core Switch is a high-capacity switch positioned in the physical core, or backbone, of a network. In a fat tree, branches nearer the top of the hierarchy are thinner than branches further down the hierarchy. FALSE Interaction is carried out on a Blockchain using rules built into the program of the Blockchain called _________. Protocols Someone wanting to conduct a transaction using Cryptocurrency must send a message with the transaction signed with their private key. TRUE In addition to being a Turing-complete cryptocurrency, Bitcoin is a ledger technology that companies are using to build new programs. FALSE Using Blockchain technology, every node has a copy of the Blockchain. TRUE The implementation of specific protocols essentially made Blockchain what it is, a distributed, peer-to-peer and secured information database. Not every Bitcoin transaction is recorded on its blockchain. FALSE Sets found in the same folderMIS307 EXAM 1 ICQs39 terms sheilaimani MIS307 EXAM 2 ICQs24 terms sheilaimani Other sets by this creatorEXAM 1 REVIEW77 terms sheilaimani Exam Review 151 terms sheilaimani MGMT402 Exam 1 (Midterm)8 terms sheilaimani Pearson Exam 198 terms sheilaimani Recommended textbook solutionsService Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions
Fundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions Other Quizlet setsGovernment test : 12/17/2062 terms juliafowler2021 IT1600 Practice Final, IT 1600 Midterm 2, IT1600 P…393 terms Bradarin Anthro Final -- Homo Erectus and Acheulean culture34 terms Teresa-361 Related questionsQUESTION (T or F) By default, new subnets in a custom VPC can communicate with each other across Availability Zones. 3 answers QUESTION You want to log every object downloaded from an S3 bucket in a specific region. You want to retain these logs indefinitely and search them easily. What's the most cost-effective way to do this? (Select TWO.) 5 answers QUESTION What are the benefits of a solid MIS infrastructure 13 answers QUESTION An optimization that replaces sequences of zeroes in an IPv6 addresses is called 2 answers What is the process of converting a plaintext to an ciphertext using a digital key?Cryptography. The sender converts the plaintext message to ciphertext. This part of the process is called encryption (sometimes encipherment ).. The ciphertext is transmitted to the receiver.. The receiver converts the ciphertext message back to its plaintext form.. Is the process of converting plaintext to ciphertext?Cryptography is the process of converting between readable text, called plaintext , and an unreadable form, called ciphertext .
|