Question: Frequency division multiplexed WANs are used to leverage the data carrying capacity of

Answer Options:
Wi-fi
Copper wires
PCs
Optical fiber

Answer: Optical fiber

 

Question: When a phone line is used to carry data traffic, the highest data rate possible is

Answer Options:
32 kbps
128 kbps
64 kbps
1.544 mbps

Answer: 1.544 mbps

 

Question: A popular TDM WAN technology is

Answer Options:
Frame relay
Synchronous Optical Network (SONET)
ATM
X.25

Answer: Synchronous Optical Network (SONET)

 

Question: In the TCP/IP stack, WAN technologies are considered to be instances of the

Answer Options:
Transport layer
Network layer
Physical layer
Data link layer

Answer: Data link layer

 

Question: ISDN stands for

Answer Options:
Inter-state data network
Improved speed digital networks
Integrated services digital network
Inter-state digital network

Answer: Integrated services digital network

 

Question: The earliest wide area data networks were built using

Answer Options:
X.25
ATM
T-carriers
Phone lines

Answer: Phone lines

 

Question: A virtual circuit ID is assigned to

Answer Options:
Each source-destination pair
Each destination
Each source
Each autonomous system

Answer: Each source-destination pair

 

Question: Confidentiality is defined as

Answer Options:
Ensuring timely and reliable use of information
None of the above
Guarding against improper modification of information to ensure authenticity
Maintaining restrictions on information to protect personal privacy

Answer: Maintaining restrictions on information to protect personal privacy

 

Question: Vulnerabilities are

Answer Options:
Restrictions on information to protect personal privacy
Weaknesses in an information system that can be exploited to compromise information security
Measures taken to mitigate the dangers from information security threats
Capabilities, intentions and methods of adversaries to compromise information security

Answer: Weaknesses in an information system that can be exploited to compromise information security

 

Question: Controls are

Answer Options:
Restrictions on information to protect personal privacy
Measures taken to mitigate the dangers from information security threats
Weaknesses in an information system that can be exploited to compromise information security
Capabilities, intentions and methods of adversaries to compromise information security

Answer: Measures taken to mitigate the dangers from information security threats

 

Question: Virtual circuits are used with

Answer Options:
Frame relay
Synchronous Optical Network (SONET)
ATM
All of the above

Answer: All of the above

 

Question: The statistically multiplexed WAN technology that is specifically designed to carry multiple kinds of traffic (data and voice) is

Answer Options:
X.25
Frame relay
T-3
ATM

Answer: ATM

 

Question: Information security controls are commonly classified in the industry as

Answer Options:
Militarized and de-militarized zones
Confidentiality, integrity and availability controls
Firewalls, passwords and anti-virus systems
Procedural, physical and technical controls

Answer: Procedural, physical and technical controls

 

Question: In data communications, a virtual circuit

Answer Options:
Cannot really carry data
Is another name for the NASCAR circuit
Is another name for a circuit
Can carry data over various real circuits

Answer: Can carry data over various real circuits

 

Question: The limitations of point-to-point technologies include all of the following except

Answer Options:
Average link utilization can be low
They can be set up easily with phone lines using modems
A very large number of links may become necessary when networks grow in size
They provide very limited opportunities for traffic aggregation

Answer: They can be set up easily with phone lines using modems