Term
Which of the following is LEAST susceptible to the unauthorized interception of data?
- Fiber Optic Cable
- UTP Cable
- STP Cable
- Coaxial Cable
|
|
Definition
|
|
Term
Which of the following database types typically combines data and funtions in a code-accessible framework? Object Oriented Flat File Databases Hierarchical Databases Relational Databases |
|
Definition
Object oriented Databases |
|
|
Term
Which of the following software testing methods provides no source code details to the tester?
1) dynamic
2) white box
3) static
4) black box |
|
Definition
the black box software testing method provides no source code details to the tester. It provides a software tester with a compiled product and no information about the products source code. |
|
|
Term
Which of the following fire suppression agents is the safest in a non electrical environment?
- CO2
- H20
- Halon
- dry powder
|
|
Definition
Water is the safest fire suppression agent in a nonelectrical environment. |
|
|
Term
Which of the following is the integrity metchod used by Wi-Fi protected Access 2 (WPA)
- CCMP counter mode w/ Ciper Block Chaining MP
- Rivest Ciper 4 RC4
- Temporal Key Integrity Protocol TKIP
- Advanced Encryption Standard AES
|
|
Definition
CCMP counter mode w/ Ciper Block Chaining Message Authentication code Protocol
can be used to validate whether the message source or the payload data was altered in transit. |
|
|