Question: Frequency division multiplexed WANs are used to leverage the data carrying capacity of
Answer Options:
Wi-fi
Copper wires
PCs
Optical fiber
Answer: Optical fiber
Question: When a phone line is used to carry data traffic, the highest data rate possible is
Answer Options:
32 kbps
128 kbps
64 kbps
1.544 mbps
Answer: 1.544 mbps
Question: A popular TDM WAN technology is
Answer Options:
Frame relay
Synchronous Optical Network (SONET)
ATM
X.25
Answer: Synchronous Optical Network (SONET)
Question: In the TCP/IP stack, WAN technologies are considered to be instances of the
Answer Options:
Transport layer
Network layer
Physical layer
Data link layer
Answer: Data link layer
Question: ISDN stands for
Answer Options:
Inter-state data network
Improved speed digital networks
Integrated services digital network
Inter-state digital network
Answer: Integrated services digital network
Question: The earliest wide area data networks were built using
Answer Options:
X.25
ATM
T-carriers
Phone lines
Answer: Phone lines
Question: A virtual circuit ID is assigned to
Answer Options:
Each source-destination pair
Each destination
Each source
Each autonomous system
Answer: Each source-destination pair
Question: Confidentiality is defined as
Answer Options:
Ensuring timely and reliable use of information
None of the above
Guarding against improper modification of information to ensure authenticity
Maintaining restrictions on information to protect personal privacy
Answer: Maintaining restrictions on information to protect personal privacy
Question: Vulnerabilities are
Answer Options:
Restrictions on information to protect personal privacy
Weaknesses in an information system that can be exploited to compromise information security
Measures taken to mitigate the dangers from information security threats
Capabilities, intentions and methods of adversaries to compromise information security
Answer: Weaknesses in an information system that can be exploited to compromise information security
Question: Controls are
Answer Options:
Restrictions on information to protect personal privacy
Measures taken to mitigate the dangers from information security threats
Weaknesses in an information system that can be exploited to compromise information security
Capabilities, intentions and methods of adversaries to compromise information security
Answer: Measures taken to mitigate the dangers from information security threats
Question: Virtual circuits are used with
Answer Options:
Frame relay
Synchronous Optical Network (SONET)
ATM
All of the above
Answer: All of the above
Question: The statistically multiplexed WAN technology that is specifically designed to carry multiple kinds of traffic (data and voice) is
Answer Options:
X.25
Frame relay
T-3
ATM
Answer: ATM
Question: Information security controls are commonly classified in the industry as
Answer Options:
Militarized and de-militarized zones
Confidentiality, integrity and availability controls
Firewalls, passwords and anti-virus systems
Procedural, physical and technical controls
Answer: Procedural, physical and technical controls
Question: In data communications, a virtual circuit
Answer Options:
Cannot really carry data
Is another name for the NASCAR circuit
Is another name for a circuit
Can carry data over various real circuits
Answer: Can carry data over various real circuits
Question: The limitations of point-to-point technologies include all of the following except
Answer Options:
Average link utilization can be low
They can be set up easily with phone lines using modems
A very large number of links may become necessary when networks grow in size
They provide very limited opportunities for traffic aggregation
Answer: They can be set up easily with phone lines using modems