Question: Availability is defined as
Answer Options:
Encrypting information
Maintaining restrictions on information to protect personal privacy
Ensuring timely and reliable use of information
Answer: Ensuring timely and reliable use of information
Question: The phone network offers a
Answer Options:
FDM WAN service
None of the above
Point-to-point network service
Statistically multiplexed network service
Answer: Point-to-point network service
Question: T-3 is a very popular WAN data service provided by telecom carriers. Its data rate is
Answer Options:
64 kbps
1.544 mbps
2.56 kbps
44.736 mbps
Answer: 44.736 mbps
Question: Frame relay specifies data rates in the range of
Answer Options:
56 kbps – 45 mbps
50.112 mbps – 150.336 mbps
1.544 mbps – 622.08 mbps
56 kbps – 2 mbps
Answer: 56 kbps – 2 mbps
Question: Information security is defined as
Answer Options:
Hiding information
Encrypting information
Providing robust data storage of information
Providing confidentiality, integrity and availability of information
Answer: Providing confidentiality, integrity and availability of information
Question: T-1 is the simplest WAN data service provided by telecom carriers. It has a data rate of
Answer Options:
64 kbps
1.544 mbps
2.56 kbps
44.736 mbps
Answer: 1.544 mbps
Question: When traversing from the source to destination, data packets typically cross
Answer Options:
Multiple LANs and one WAN
Multiple LANs and multiple WANs
One LAN and multiple WANs
None of the above
Answer: Multiple LANs and multiple WANs
Question: Virtual circuit IDs are
Answer Options:
None of the above
Shared among neighboring network carriers
Global
Local to the network carrier
Answer: Local to the network carrier
Question: ATM specifies data rates in the range of
Answer Options:
56 kbps – 45 mbps
56 kbps – 2 mbps
50.112 mbps – 150.336 mbps
1.544 mbps – 622.08 mbps
Answer: 1.544 mbps – 622.08 mbps
Question: Integrity is defined as
Answer Options:
Guarding against improper modification of information to ensure authenticity
Maintaining restrictions on information to protect personal privacy
Ensuring timely and reliable use of information
None of the above
Answer: Guarding against improper modification of information to ensure authenticity
Question: The statistically multiplexed WAN technology that uses link-by-link acknowledgments is
Answer Options:
X.25
T-3
ATM
Frame relay
Answer: X.25
Question: Compared to point-to-point links, statistically multiplexed WANs improve data link utilization by
Answer Options:
Increasing the number of data terminals
Increasing the number of end users
Aggregating traffic
Increasing data link capacity
Answer: Aggregating traffic
Question: Statistically multiplexed WANs are defined by their ability to allocate network resources
Answer Options:
On a dedicated basis
According to defined frequencies
According to needs
According to defined time slots
Answer: According to needs
Question: In data communications, the term ATM stands for
Answer Options:
Any time money
Any transfer method
Asynchronous transfer mode
Automatic teller machine
Answer: Asynchronous transfer mode
Question: Threats are
Answer Options:
Capabilities, intentions and methods of adversaries to compromise information security
Weaknesses in an information system that can be exploited to compromise information security
Measures taken to mitigate the dangers from information security threats
Restrictions on information to protect personal privacy
Answer: Capabilities, intentions and methods of adversaries to compromise information security