Question: ISDN stands for
Answer Options:
Answer: Integrated services digital network
Question: Compared to point-to-point links, statistically multiplexed WANs improve data link utilization by
Answer Options:
Answer: Aggregating traffic
Question: The statistically multiplexed WAN technology that is specifically designed to carry multiple kinds of traffic (data and voice) is
Answer Options:
Answer: ATM
Question: When traversing from the source to destination, data packets typically cross
Answer Options:
Answer: Multiple LANs and multiple WANs
Question: The limitations of point-to-point technologies include all of the following except
Answer Options:
Answer: They can be set up easily with phone lines using modems
Question: When a device has data to be delivered over a WAN network
Answer Options:
Answer: The data is merged with the existing traffic
Question: When a phone line is used to carry data traffic, the highest data rate possible is
Answer Options:
Answer: 1.544 mbps
Question: Virtual circuit IDs are
Answer Options:
Answer: Local
Question: In network security, a firewall is a device which lies between two networks and
Answer Options:
Answer: Regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network
Question: The most popular implementation of asymmetric key encryption is
Answer Options:
Answer: Rivest, Shamir and Adleman (RSA)
Question: A benefit of using firewalls is that
Answer Options:
Answer: It can block traffic from any identified host or network
Question: SSH is used for
Answer Options:
Answer: Secure access to direct access to a remote computer
Question: All the following are properties of asymmetric key encryption, except
Answer Options:
Answer: It is computationally simple
Question: Information security controls are commonly classified in the industry as
Answer Options:
Answer: Procedural, physical and technical controls
Question: Most commercial encryption technologies such as SSL and VPN
Answer Options:
Answer: Combine the best features of symmetric and asymmetric key encryption
Question: Redundancy is
Answer Options:
Answer: The provision of surplus service capacity to improve availability
Question: Controls are
Answer Options:
Answer: Measures taken to mitigate the dangers from information security threats