Question: ISDN stands for

Answer Options:

Inter-state data network
Inter-state digital network
Improved speed digital network
Integrated services digital network

Answer: Integrated services digital network

 

Question: Compared to point-to-point links, statistically multiplexed WANs improve data link utilization by

Answer Options:

Increasing data link capacity
Increasing the number of data links available
Increasing the number of end users
Aggregating traffic

Answer: Aggregating traffic

 

Question: The statistically multiplexed WAN technology that is specifically designed to carry multiple kinds of traffic (data and voice) is

Answer Options:

Frame relay
ATM
T-3
X.25

Answer: ATM

 

Question: When traversing from the source to destination, data packets typically cross

Answer Options:

Multiple LANs and multiple WANs
Multiple LANs and one WAN
One LAN and multiple WANs
None of the above

Answer: Multiple LANs and multiple WANs

 

Question: The limitations of point-to-point technologies include all of the following except

Answer Options:

They provide very limited opportunities for traffic aggregation
They can be set up easily with phone lines using modems
A very large number of links may become necessary when networks grow in size
Average link utilization can be low

Answer: They can be set up easily with phone lines using modems

 

Question: When a device has data to be delivered over a WAN network

Answer Options:

It waits for the medium to become idle
It stops the existing traffic over the medium to send the data
The data is merged with the existing traffic
None of the above

Answer: The data is merged with the existing traffic

 

Question: When a phone line is used to carry data traffic, the highest data rate possible is

Answer Options:

32 kbps
1.544 mbps
128 kbps
64 kbps

Answer: 1.544 mbps

 

Question: Virtual circuit IDs are

Answer Options:

Global
Local

Answer: Local

 

Question: In network security, a firewall is a device which lies between two networks and

Answer Options:

Regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network
Regulates the movement of network administrators from the external network to the internal network
Prevents fires in the external network from spreading to the internal network
None of the above

Answer: Regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network

 

Question: The most popular implementation of asymmetric key encryption is

Answer Options:

Data Encryption Standard (DES)
International Data Encryption Algorithm (IDEA)
Advanced Encryption Standard (AES)
Rivest, Shamir and Adleman (RSA)

Answer: Rivest, Shamir and Adleman (RSA)

 

Question: A benefit of using firewalls is that

Answer Options:

It can defend the organization even if an internal computer is compromised
It can protect servers accessible from the internet (e.g., web, email servers)
It can block traffic from any identified host or network
Its effectiveness depends upon the abilities of the administrator

Answer: It can block traffic from any identified host or network

 

Question: SSH is used for

Answer Options:

Secure web browsing
Secure access to direct access to a remote computer
Electronic commerce by end users
Espionage

Answer: Secure access to direct access to a remote computer

 

Question: All the following are properties of asymmetric key encryption, except

Answer Options:

It makes it easy to exchange the encryption key
It uses two keys
It is computationally simple
The key used for encryption cannot be used for decryption

Answer: It is computationally simple

 

Question: Information security controls are commonly classified in the industry as

Answer Options:

Confidentiality, integrity and availability controls
Firewalls, passwords and anti-virus systems
Militarized and de-militarized zones
Procedural, physical and technical controls

Answer: Procedural, physical and technical controls

 

Question: Most commercial encryption technologies such as SSL and VPN

Answer Options:

Combine the best features of symmetric and asymmetric key encryption
Use only symmetric key encryption
Use only asymmetric key encryption
Allow the user to choose whether to use symmetric or asymmetric key encryption

Answer: Combine the best features of symmetric and asymmetric key encryption

 

Question: Redundancy is

Answer Options:

Scheduling periodic maintenance to improve availability
Hiding information to provide confidentiality
The provision of surplus service capacity to improve availability
None of the above

Answer: The provision of surplus service capacity to improve availability

 

Question: Controls are

Answer Options:

Weaknesses in an information system that can be exploited to compromise information security
Capabilities, intentions and methods of adversaries to compromise information security
Measures taken to mitigate the dangers from information security threats
Restrictions on information to protect personal privacy

Answer: Measures taken to mitigate the dangers from information security threats