Exam Stuff Flashcards

1
Q

How is a hash key used to retrieve a value?

A

You search for the number that matches the hash key, then undertake a linear search to find the value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identify one appropriate security measure that could protect data and how the measure would protect data.

A

Firewalls - control and regulate the flow of packets through a network’s ports and blocks packets with malicious or unauthorized information. A firewall would severely restrict the ability of hackers to enter the network and steal a system’s sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe one backup procedure with reference to medium and frequency.

A
  • Regular incremental backups to a hard drive stored offsite (daily)
  • Full backup once a week on a magnetic tape (weekly)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe a suitable Network Protocol which can secure data

A

Secure Socket Layer -

  • Firstly, a transfer packet and public key is sent which explains how to turn plain text into ciphertext
  • A private key is then encrypted with the public key which explains how to decrypt ciphertext
  • A secure connection is then established and information can be exchanged quickly and securely.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of technical issues that can be experienced when you implement new software into an old system?

A

Insufficient Storage
Security
Maintainability
Interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can a business adhere to its legal obligations when working with data?

A

Option to opt out
Going to reasonable lengths to protect the privacy of the data
Asking for consent
Privacy Policy in accordance with APP1 of the Australian Privacy Policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is the structure of an XML better than a simple file such as CSV?

A

XML files are structured using tags to give data meaning in any program. They allow for structure and meaning to be conserved when transporting data or if data is modified, whereas simple files such as CSV are seen to lack structure/meaning due to them only storing new data as opposed to structured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the most secure form of transmission and compare it to a poor form of transmission?

A

VPN as it creates an encrypted tunnel for security, which means that it needs a decryption key if data is to be intercepted and understood. Plain text which is easily intercepted and read by unauthorised users, which can be found through wireless transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly