Question: Availability is defined as

Answer Options:
Encrypting information
Maintaining restrictions on information to protect personal privacy
Ensuring timely and reliable use of information

Answer: Ensuring timely and reliable use of information

 

Question: The phone network offers a

Answer Options:
FDM WAN service
None of the above
Point-to-point network service
Statistically multiplexed network service

Answer: Point-to-point network service

 

Question: T-3 is a very popular WAN data service provided by telecom carriers. Its data rate is

Answer Options:
64 kbps
1.544 mbps
2.56 kbps
44.736 mbps

Answer: 44.736 mbps

 

Question: Frame relay specifies data rates in the range of

Answer Options:
56 kbps – 45 mbps
50.112 mbps – 150.336 mbps
1.544 mbps – 622.08 mbps
56 kbps – 2 mbps

Answer: 56 kbps – 2 mbps

 

Question: Information security is defined as

Answer Options:
Hiding information
Encrypting information
Providing robust data storage of information
Providing confidentiality, integrity and availability of information

Answer: Providing confidentiality, integrity and availability of information

 

Question: T-1 is the simplest WAN data service provided by telecom carriers. It has a data rate of

Answer Options:
64 kbps
1.544 mbps
2.56 kbps
44.736 mbps

Answer: 1.544 mbps

 

Question: When traversing from the source to destination, data packets typically cross

Answer Options:
Multiple LANs and one WAN
Multiple LANs and multiple WANs
One LAN and multiple WANs
None of the above

Answer: Multiple LANs and multiple WANs

 

Question: Virtual circuit IDs are

Answer Options:
None of the above
Shared among neighboring network carriers
Global
Local to the network carrier

Answer: Local to the network carrier

 

Question: ATM specifies data rates in the range of

Answer Options:
56 kbps – 45 mbps
56 kbps – 2 mbps
50.112 mbps – 150.336 mbps
1.544 mbps – 622.08 mbps

Answer: 1.544 mbps – 622.08 mbps

 

Question: Integrity is defined as

Answer Options:
Guarding against improper modification of information to ensure authenticity
Maintaining restrictions on information to protect personal privacy
Ensuring timely and reliable use of information
None of the above

Answer: Guarding against improper modification of information to ensure authenticity

 

Question: The statistically multiplexed WAN technology that uses link-by-link acknowledgments is

Answer Options:
X.25
T-3
ATM
Frame relay

Answer: X.25

 

Question: Compared to point-to-point links, statistically multiplexed WANs improve data link utilization by

Answer Options:
Increasing the number of data terminals
Increasing the number of end users
Aggregating traffic
Increasing data link capacity

Answer: Aggregating traffic

 

Question: Statistically multiplexed WANs are defined by their ability to allocate network resources

Answer Options:
On a dedicated basis
According to defined frequencies
According to needs
According to defined time slots

Answer: According to needs

 

Question: In data communications, the term ATM stands for

Answer Options:
Any time money
Any transfer method
Asynchronous transfer mode
Automatic teller machine

Answer: Asynchronous transfer mode

 

Question: Threats are

Answer Options:
Capabilities, intentions and methods of adversaries to compromise information security
Weaknesses in an information system that can be exploited to compromise information security
Measures taken to mitigate the dangers from information security threats
Restrictions on information to protect personal privacy

Answer: Capabilities, intentions and methods of adversaries to compromise information security