Sh3rrymagdah
On this page, you find all documents, package deals, and flashcards offered by seller sh3rrymagdah.
- 620
- 0
- 32
Community
- Followers
- Following
651 items
CMSC 424 SQL Midterm(100% correct answers)
RDBMS acronym correct answers relational database management system 
 
RDBMS attributes correct answers data stored in tables, relationships represented by common values such as primary keys and foreign keys 
 
3 benefits of having the SQL standard correct answers reduced training costs, productivity, application portability, application longevity, reduced dependence on a single vendor, cross-system comms 
 
3 categories of SQL commands correct answers DDL(definition), DML(manipulation), DCL(con...
- Exam (elaborations)
- • 7 pages •
RDBMS acronym correct answers relational database management system 
 
RDBMS attributes correct answers data stored in tables, relationships represented by common values such as primary keys and foreign keys 
 
3 benefits of having the SQL standard correct answers reduced training costs, productivity, application portability, application longevity, reduced dependence on a single vendor, cross-system comms 
 
3 categories of SQL commands correct answers DDL(definition), DML(manipulation), DCL(con...
CMSC 426(Complete solutions)
CMSC 426 Midterm(Complete solutions)
CMSC-426 Final Exam Review(A+ Guaranteed)
CMSC-426 Exam 1(Complete solutions)
- Package deal
- • 10 items •
- CMSC 426(Complete solutions) • Exam (elaborations)
- CMSC-426 Exam 1(Complete solutions) • Exam (elaborations)
- CMSC 426 - Final Exam MC and T/F(Correctly solved) • Exam (elaborations)
- CMSC 426 Midterm(Complete solutions) • Exam (elaborations)
- CMSC-426 Final Exam Review(A+ Guaranteed) • Exam (elaborations)
- And more ….
CMSC 426 Midterm(Complete solutions)
CMSC-426 Final Exam Review(A+ Guaranteed)
CMSC-426 Exam 1(Complete solutions)
CMIS 426 Exam 2(100% Verified)
Enumeration correct answers the process of extracting the following information from a network 
 
resources or shares on the network 
network topology 
Usernames or groups assigned to network 
Information about users and recent logon times 
 
Domain Controller correct answers A Windows server that stores user account information, authenticates domain logons, maintains the master database, and enforces security policies for a Windows domain. 
 
null session correct answers An unauthorized connec...
- Package deal
- Exam (elaborations)
- • 3 pages •
Enumeration correct answers the process of extracting the following information from a network 
 
resources or shares on the network 
network topology 
Usernames or groups assigned to network 
Information about users and recent logon times 
 
Domain Controller correct answers A Windows server that stores user account information, authenticates domain logons, maintains the master database, and enforces security policies for a Windows domain. 
 
null session correct answers An unauthorized connec...
CMIS 426 EXAM 1(Correctly answered)
black box correct answers A model for penetration testing in which management doesn't divulge to IT security personnel that testing will be conducted or give the testing team a description of the network topology 
 
Certified Information Systems Security Professional (CISSP) correct answers non vendor specific certification issued by International Information Systems Cert 
 
cookie correct answers a text file containing a message sent from web server to a user web browser to be used later when ...
- Package deal
- Exam (elaborations)
- • 3 pages •
black box correct answers A model for penetration testing in which management doesn't divulge to IT security personnel that testing will be conducted or give the testing team a description of the network topology 
 
Certified Information Systems Security Professional (CISSP) correct answers non vendor specific certification issued by International Information Systems Cert 
 
cookie correct answers a text file containing a message sent from web server to a user web browser to be used later when ...
CMSC 426 Exam II Malware(A+ Graded)
Malware stands for correct answers malicious software 
 
Malware Definition correct answers a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system or otherwise annoying or disrupting the victim. 
 
Malware compromises: (3) correct answers confidentiality, integrity, availability 
 
2 broad categories of classifications of malware correct answers 1) how it ...
- Package deal
- Exam (elaborations)
- • 10 pages •
Malware stands for correct answers malicious software 
 
Malware Definition correct answers a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system or otherwise annoying or disrupting the victim. 
 
Malware compromises: (3) correct answers confidentiality, integrity, availability 
 
2 broad categories of classifications of malware correct answers 1) how it ...
CMSC 426 Module 3(with complete solutions)
enterprise information security policy (EISP) correct answers The high-level information security policy that sets the strategic direction, scope, and tone for all of an organization's security efforts. 
 
What are the different management functions with respect to information security? correct answers 5Ps 
Planning 
Policy 
Programs 
Protection 
People 
Projects 
 
strategic planning correct answers The process of defining and specifying the long-term direction (strategy) to be taken by an org...
- Package deal
- Exam (elaborations)
- • 5 pages •
enterprise information security policy (EISP) correct answers The high-level information security policy that sets the strategic direction, scope, and tone for all of an organization's security efforts. 
 
What are the different management functions with respect to information security? correct answers 5Ps 
Planning 
Policy 
Programs 
Protection 
People 
Projects 
 
strategic planning correct answers The process of defining and specifying the long-term direction (strategy) to be taken by an org...
CMSC 426 Midterm Vocab(All Accurately solved)
What is the CIA triad? correct answers C- Confidentiality 
I- Integrity 
A- Availability 
 
What is confidentiality correct answers information should stay private 
 
what is integrity correct answers information should not be improperly modified or destroyed 
 
what is availability correct answers info should remain accessible in a timely and reliable manner 
 
what is non-repudiation correct answers actions can be traced back to their agents with certainty 
 
what is assurance correct answers ...
- Package deal
- Exam (elaborations)
- • 13 pages •
What is the CIA triad? correct answers C- Confidentiality 
I- Integrity 
A- Availability 
 
What is confidentiality correct answers information should stay private 
 
what is integrity correct answers information should not be improperly modified or destroyed 
 
what is availability correct answers info should remain accessible in a timely and reliable manner 
 
what is non-repudiation correct answers actions can be traced back to their agents with certainty 
 
what is assurance correct answers ...
CMSC-426 Final Exam Review(A+ Guaranteed)
What are the three security objectives? correct answers The CIA triad 
 
What does CIA stand for? correct answers Confidentiality, Integrity, Availability 
 
What is Confidentiality in the CIA triad concerned with? correct answers data is not available to unauthorized persons/systems, users have control over their information and who sees it 
 
What is Integrity in the CIA triad concerned with? correct answers accuracy and completeness of data is assured, system performs functions unimpeded 
 
W...
- Package deal
- Exam (elaborations)
- • 5 pages •
What are the three security objectives? correct answers The CIA triad 
 
What does CIA stand for? correct answers Confidentiality, Integrity, Availability 
 
What is Confidentiality in the CIA triad concerned with? correct answers data is not available to unauthorized persons/systems, users have control over their information and who sees it 
 
What is Integrity in the CIA triad concerned with? correct answers accuracy and completeness of data is assured, system performs functions unimpeded 
 
W...
CMSC 426 Midterm(Complete solutions)
CIANA correct answers Confidentiality 
Integrity 
Availability 
Non-repudiation 
Authentication 
 
Confidentiality correct answers Data is not available to unauthorized persons/systems 
Users have control over their information and who sees it 
 
Integrity correct answers Accuracy and completeness of data is assured 
System performs functions unimpeded 
 
Availability correct answers System, information, and means of access are kept in working order and function correctly 
 
Non-repudiation corr...
- Package deal
- Exam (elaborations)
- • 8 pages •
CIANA correct answers Confidentiality 
Integrity 
Availability 
Non-repudiation 
Authentication 
 
Confidentiality correct answers Data is not available to unauthorized persons/systems 
Users have control over their information and who sees it 
 
Integrity correct answers Accuracy and completeness of data is assured 
System performs functions unimpeded 
 
Availability correct answers System, information, and means of access are kept in working order and function correctly 
 
Non-repudiation corr...
CMSC 426 - Final Exam MC and T/F(Correctly solved)
Which of the following encryption functions has perfect secrecy? 
a) XOR cipher 
b) RC4 stream cipher 
c) 3DES block cipher 
d) One-time pad correct answers d) One-time pad 
 
Which of the following describes the security of Diffie Hellman Key Exchange? 
a) An attacker would need to factor one of Alice or Bob's public integers in order to recover one of the private integers. 
b) An attacker would need to solve the discrete logarithm problem to recover Alice or Bob's private integer from the pu...
- Package deal
- Exam (elaborations)
- • 12 pages •
Which of the following encryption functions has perfect secrecy? 
a) XOR cipher 
b) RC4 stream cipher 
c) 3DES block cipher 
d) One-time pad correct answers d) One-time pad 
 
Which of the following describes the security of Diffie Hellman Key Exchange? 
a) An attacker would need to factor one of Alice or Bob's public integers in order to recover one of the private integers. 
b) An attacker would need to solve the discrete logarithm problem to recover Alice or Bob's private integer from the pu...