![]() ![]() their own private key Firewall rules for blocking/allowing packets are based on both TCP port numbers and. ![]() insiders Can be programmed to unleash a SPAM flood, target website with a DOS attack, spread a worm Botnet T/F: Hacker attacks always result in serious harm to government systems False A specific attack mode intended to shutdown a website by overloading it with bogus connections DOS An organized collection of zombies that are controlled collectively by remote control Bot-net Using PKI to implement a digital signature, the sender would encrypt a message with. website privacy policy statements Advanced searching methods seeking hidden relationships within a "data-warehouse" data mining US Gov FTC principles guiding organizations in the ethical gathering/handling of personal info Fair Information Practices (FIP) T/F: A zombie is a computer that has been compromised with malware which is dormant until activated by remote control True The most common type of e-crime perpetrated against e-government sites Malicious code T/F: Encryption is a form of malicious software False T/F: Port scanning uses a bar-code system like the scanners at point-of-sales terminals False The largest threat to public sector IT systems comes from. server farm The most dynamic scaling method Cloud computing A general category of Data Center or System Administration procedures Procedures on Installing Server Hardware T/F: Modern large-scale data centers will almost certainly have a Redundant Network Infrastructure built in False T/F: Web development expertise, such as server-side scripting, is likely not a qualification for a systems administrator True When do data center procedures NOT dictate Assets/Inventory database updating When a system is re-named or re-located T/F: Evacuation planning would be managed via Data Center policies & procedures True the procedure for big upgrades to a server, requiring prolonged downtime Change Management Commonly used for conducting systems administration actions, like security audits System log data T/F: "All equipment must be purchased from approved vendor list" is not a common equipment installation procedure True T/F: "All cords and cables must be labeled at both ends" is not a common equipment installation procedure False T/F: "All clutter and packaging must be removed" is not a common equipment installation procedure False T/F: "New equipment must be added to the data center assets database" is not a common equipment installation procedure False An important DAILY procedure performed by the system admin Backing up data In what state should the US federal gov't build its next data center if the criteria for location is based on energy efficiency Minnesota (it's cold) T/F: Encryption methods and PKI do not amplify the issues of information privacy protection in the information age True T/F: Management cannot be held legally accountable for online gambling by their employees True T/F: Sarbanos Oxley Act (SOX) is an instance of US law, amongst many, that protects specific types of information privacy False T/F: Cookies can contain and spread viruses False The evidence for the wide spread acceptance of the fair information practices can best be found on an organizations. another virtual server Having multiple servers provided by a single computer virtualization The best scaling method for providing a relatively simple web app to a large number of users ? storage area network ? Mandates cloud computing services for gov't agencies General Services Administration Adding CPUs to a server to increase performance is _ scaling vertical prevents the overloading of servers in a server farm load balancing Addresses server sprawl, power/space reqs, reducing demands for system administration Virtual server Blade server could be deployed as a. ![]() ![]() Combining the computational power of many individual computers for a single complex application Horizontal scaling Virtual servers get their file-system from. ![]()
0 Comments
Leave a Reply. |