Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
In Class Quizzes - Lectures 22-26
Terms in this set (30)
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.
TRUE
Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.
TRUE
Maintaining data integrity is not a primary goal of security.
FALSE
A crypting service
runs some custom encryption routines to obfuscate malware
A Distributed DoS (DDoS) attack
is often performed using a network of compromised computers
It is not possible to map the traffic flow of Bitcoin transactions
FALSE
Decryption is the process of converting plaintext into ciphertext.
FALSE
Asymmetric encryption uses the same key to encrypt and decrypt a message.
FALSE
When using a digital signature for the process of authentication, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.
TRUE
Secure Sockets Layer SSL is the latest cryptographic protocol designed to
provide communications security over a computer network.
FALSE
Websites can use TLS to secure all communications between their
servers and web browser.
TRUE
Public key cryptography uses a private key to encrypt a piece of data, and then the recipient uses the public key to decrypt the data.
FALSE
A risk assessment assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.
TRUE
A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.
threat
A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.
denial of service
Anomaly detection compares network characteristics against
"normal"
activities to judge intrusions.
TRUE
IPS is a monitoring system, while IDS is a control system.
FALSE
IPS systems compare the current network activity
to a known threat database to detect several kinds
of behaviors like security policy violations, malware,
and port scanners.
FALSE
The trend toward server-side computing and the exploding popularity of Internet services has created a new class of computing systems that we have named warehouse-scale computers , or WSC.
TRUE
Warehouse-scale computers currently power the services offered by companies such as Google, Amazon, Facebook, and Microsoft's online services division. They differ significantly from traditional datacenters: they belong to a single organization, use a relatively homogeneous hardware and system software platform, and share a common systems management layer.
TRUE
The datacenters powering many of today's successful Internet services are simply a miscellaneous collection of machines co-located in a facility and wired up together.
FALSE
Achieving fault-free operation on a large collection of hardware and system software is made easier by the large number of servers involved.
FALSE
A Core Switch is
a high-capacity switch positioned in the physical core, or backbone, of a network.
In a fat tree, branches nearer the top of the hierarchy are thinner than branches further down the hierarchy.
FALSE
Interaction is carried out on a Blockchain using rules built into the program of the Blockchain called _________.
Protocols
Someone wanting to conduct a transaction using Cryptocurrency must send a message with the transaction signed with their private key.
TRUE
In addition to being a Turing-complete cryptocurrency, Bitcoin is a ledger technology that companies are using to build new programs.
FALSE
Using Blockchain technology, every node has a copy of the Blockchain.
TRUE
The implementation of specific protocols essentially made Blockchain what it is,
a distributed, peer-to-peer and secured information database.
Not every Bitcoin transaction is recorded on its blockchain.
FALSE
Sets found in the same folderMIS307 EXAM 1 ICQs
39 terms
sheilaimani
MIS307 EXAM 2 ICQs
24 terms
sheilaimani
Other sets by this creatorEXAM 1 REVIEW
77 terms
sheilaimani
Exam Review 1
51 terms
sheilaimani
MGMT402 Exam 1 (Midterm)
8 terms
sheilaimani
Pearson Exam 1
98 terms
sheilaimani
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Fundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Other Quizlet setsGovernment test : 12/17/20
62 terms
juliafowler2021
IT1600 Practice Final, IT 1600 Midterm 2, IT1600 P…
393 terms
Bradarin
Anthro Final -- Homo Erectus and Acheulean culture
34 terms
Teresa-361
Related questionsQUESTION
(T or F) By default, new subnets in a custom VPC can communicate with each other across Availability Zones.
3 answers
QUESTION
You want to log every object downloaded from an S3 bucket in a specific region. You want to retain these logs indefinitely and search them easily. What's the most cost-effective way to do this? (Select TWO.)
5 answers
QUESTION
What are the benefits of a solid MIS infrastructure
13 answers
QUESTION
An optimization that replaces sequences of zeroes in an IPv6 addresses is called
2 answers