NAME

Question Types


Start With


Question Limit

of 832 available terms
(4 exact duplicates found)

Advertisement Upgrade to remove ads

5 Written Questions

5 Matching Questions

  1. interactions
  2. Rootkit
  3. HTTP
  4. Archive
  5. VPN (Virtual Private Network)
  1. a any of the four fundamental ways in which elementary particles and bodies can influence each other
  2. b "Software that conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system."
  3. c A connection that provides the functionality of a privately owned network while using the internet.
  4. d "A copy of a database, master file, or software that will be retained indefinitely as an historical record, usually to satisfy legal and regulatory requirements."
  5. e HTTP is a protocol that was designed to deliver HTML content to web browsers
    HTTP can be used to
    -Request information about the sever
    -Request documents from the server
    -Send documents to the server
    -Delete documents from the server

5 Multiple Choice Questions

  1. Firm's Needed Investment in New Assets
  2. use data and algorithms to forecast future events
  3. effective efficient performance of tasks
  4. The person responsible for managing the Product Backlog so as to maximize the value of the project. The Product Owner is responsible for representing the interests of everyone with a stake in the project and its resulting product.
  5. "Provides protection in the event of a prolonged power outage, using battery power to enable the system to operate lone enough to back up critical data and safely shut down."

5 True/False Questions

  1. When creating a forensic image using Imager, what happens automatically to the summary information file regarding Location and File NamingHelp -> Recovery Module

          

  2. Path"A segment of self-replicating, executable code that attaches itself to a file or program."

          

  3. Flowcharting Template"An Analytical technique used to describe some aspect of an information system in a clear, concise, and logical manner."

          

  4. Security Support MandatoryIPSec provides
    Encrypted transport
    Certificate based authentication

          

  5. control accountA planned undertaking that has a beginning and an end and that produces a desired result or product.

          

Create Set