Database contains information about all OSPF

Database contains information about all OSPFWhat multicast address does RIPv2 use to send out its routing table updates? · 224.0.0.9 In OSPF, the ________ database contains information about all OSPF peers with which a router has successfully exchanged Hello packets. · Adjacencies DUAL uses the EIGRP _________ table to track the status of all links in a network. · Topology DUAL uses the _________ ...

Read more

Eliminate the risk- most effective- not necessarily most cost effectivePure Risk · Only opportunity for loss Speculative Risk · uncertainty that could be loss or gain Hazards · items that contribute to the perils that result in risk- actions that increase risk Triggers · items that are indicators of hazards Risk Appetite · the amount of risk acceptance by an organization- ch...

Read more

Cryptographic transfer protocols used to exchange data securelyTypes of Event Logs · Account Activity Logs 2. Network Activity Logs 3. Operating System/Server Logs 4. Application activity Logs(Role based logging, api logging, system performance logs, http logging, etc) Account Activity Logs · Any activity performed by administrators and privileged accounts. 1. Creation of accounts and de-provisioning 2. Addition or...

Read more

Activity Based Costing process

Activity Based Costing processKey limitation of ROI · does not take risk into consideration The logic underlying the three-horizons theory of growth in strategy development is that · a portfolio of initiatives can generate income and allow exploration of opportunities over time Economics is the social science of how individuals, institutions and society make choices. Which of the following is an ever present co...

Read more

Enterprise Risk Management

Enterprise Risk ManagementRisk Management · a scientific approach to the problem of dealing with the risks facing the business firm Market Risk · the risk arising from adverse movements in market prices Credit Risk · the risk arising from the potential that a borrower will fail to pay a debt Liquidity Risk · the risk that the business will have insufficient liquid assets to meet obligations...

Read more

Multicast addresses does OSPFv3 use

Multicast addresses does OSPFv3 useWhich of the following is true when describing a global unicast address? A. Packets addressed to a unicast address are delivered to a single interface. B. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. C. These are like private addresses in IPv4 in that they are not meant to be routed over the Internet. D. These addresses are meant for no...

Read more

Network service is the most likely problem

Network service is the most likely problemOn a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? A. /27 B. /28 C. /29 D. /30 E. /31 · D. A point-to-point link uses only two hosts. A /30, or 255.255.255.252, mask provides two hosts per subnet. To use VLSM, what capability must the routing protocols in use possess? A. Support for multicast B...

Read more

Approve the risk management policy

Approve the risk management policyWhat is the purpose of risk management? · Minimize adverse effects of actual and potential losses by either prevention or risk financing What are the steps in the risk management process? · determine risk tolerance 2. identify potential exposures 3. quantify impact level 4. develop and implement risk management strategy 5. monitor exposures and evaluate strategy effectiveness 6. re...

Read more

A malicious program designed to spread rapidly

A malicious program designed to spread rapidlyMalware · software that is intended to damage or disable computers and computer systems. computer virus · a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer Computer Worm · A malicious program designed to spread rapidly to a large number of computers by sending copies of ...

Read more

Process of converting readable data into unreadable character

Process of converting readable data into unreadable characterPrimary_Domain · The portion of a web site address that identifies the type of site it is (.gov, .edu, .com). IP address · A number assigned to any item that is connected to the Internet. Domain Name System (DNS) · Internet service that translates domain names into IP addresses. URL · Uniform Resource Locator Domain_Name ...

Read more

High level programming language

High level programming languageIntegrated Development Environment (IDE) · An application that includes an editor (a sort of programmer's word processor), debugger, and compiler, among other tools. Low level programming language · A programming language that provides little or no abstraction from a computer's instruction set architecture—commands or functions in the language map closely to processor instructions. Gene...

Read more

Internet Engineering Task Force

Internet Engineering Task ForceInternet · a computer network that uses open protocols to standardize communication. computer network · an interconnected computing system that is capable of sending or receiving data. computing system · a group of computing devices and programs working together for a common purpose. computing device · a physical object that can run a program, such as computer...

Read more

A security administrator wants to check user password complexity.362. Which of the following is a hardware based encryption device? · A. EFS B. TrueCrypt C. TPM D. SLE · TPM (Trusted Platform Module) 361. Certificates are used for: (Select TWO) · A. Client authentication. B. WEP encryption. C. Access control lists. D. Code signing. E. Password hashing. · Client authentication. D. Code signing. 360....

Read more

Employee badges are encoded with a private encryption key and specific personal information362. Which of the following is a hardware based encryption device? · A. EFS B. TrueCrypt C. TPM D. SLE · TPM (Trusted Platform Module) 361. Certificates are used for: (Select TWO) · A. Client authentication. B. WEP encryption. C. Access control lists. D. Code signing. E. Password hashing. · Client authentication. D....

Read more

Evaluate the multi store model of memory

Evaluate the multi store model of memorywhat are the three kinds of recall? · free recall, recognition recall and cued recall what is free recall? · the researcher just asks the participant to repeat back or write down as many things as they can remember what is cued recall? · it is linked to a method of learning the participant is asked to learn words in linked pairs they are then given the first word ...

Read more

Guiding Principles can be used to guide organization

Guiding Principles can be used to guide organizationGuiding Principle · A recommendation that guides organizations in all circumstances. Difference between a Principle and a Practice? · Principles are underlying truths that don't change over time or space. Practices are the application of principles to a particular situation. 7 Guiding Principles · Focus on Value 2. Start where you are 3. Progress itera...

Read more

The Origins of ITIL Practices

The Origins of ITIL PracticesPractice · A set of organizational resources designed for performing work or accomplishing an objective. The Origins of ITIL Practices · General Management Practices 2. Service Management Practices 3. Technical Management Practices General Management Practices - Continual Improvement - Information Security Management - Relationship Management - Supplier Management S...

Read more

The value chain activities use different combinations

The value chain activities use different combinationsFour Dimensions of Service Management · Organizations & People 2. Information & Technology 3. Partners and Suppliers 4. Value Streams & Processes Organizations & People · Culture, Shared values & Attitudes 2. Skills and competencies Information & Technology · Security & regulatory compliance requirements. 2. Information...

Read more

Rootkits containing Trojan binary programs that are ready

Rootkits containing Trojan binary programs that are readyWindows Software Update Services is designed to manager patching and updating system software from the network · true Samba is proprietary implementation of CIFS · false Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs · true What critical component of any OS that can be ca...

Read more

Give your secret brain a chance

Give your secret brain a chanceWhat does the textbook author mean by visualization #1 a well worn path ? · To reveiw over new information agian to tranfer it from short term memory to long term memory What does the textbook author mean by visualization #2 a herd of thoughts ? · Link new information to something you already know to aid in learning What does the textbook author mean by visualization#3 turning your...

Read more
Showing 1 to 20 of 617353 entries

Invite Tutor