Term
____ is the effect of one communications channel upon another. Crosstalk occurs when one transmission “bleeds” over to another. |
|
Definition
a. Crosstalk * b. Jitter c. Echo d. Distortion |
|
|
Term
____ prepares an organization to reestablish critical business operations during a disaster that affects operations at the primary site. |
|
Definition
a. Incident Response Planning b. Disaster Recovery Planning c. Developing Continuity d. Business Continuity Planning * |
|
|
Term
A ____ SysSP document is created by management to guide the implementation and configuration of technology as well as to regulate the behavior of people in the organization. |
|
Definition
a. technical specifications b. managerial guidance * c. policy management d. configuration rule policy |
|
|
Term
A(n) ____ hacks the public telephone network to make free calls or disrupt services. |
|
Definition
a. cracker b. phreaker * c. packet monkey d. elite |
|
|
Term
A(n) ____ is also known as a general security policy, IT security policy, or information security policy. |
|
Definition
a. Issue-Specific Security Policy (ISSP) b. System-Specific Policy (SysSP) c. information security policy d. Enterprise Information Security Policy (EISP) * |
|
|
Term
A(n) ____ is an object, person, or other entity that represents a constant danger to an asset. |
|
Definition
a. attack b. threat * c. error d. failure |
|
|
Term
A(n) ____ network uses a logical ring topology and require stations to possess a token — essentially a data frame with no data — prior to being allowed to transmit data. |
|
Definition
a. frame relay b. token ring * c. ATM d. FDDI |
|
|
Term
Attempting to reverse-calculate a password is often called ____. |
|
Definition
a. cracking * b. dictionary attack c. password attack d. brute force attack |
|
|
Term
The ____ serves to reinforce the position of the U.S. government and industry while helping to ensure the safety and the health of consumers and ensuring environmental protection. |
|
Definition
a. International Telecommunication Union b. Institute of Electrical and Electronics Engineers c. American National Standards Institute * d. Telecommunications Industry Association |
|
|
Term
The application of computing and network resources to try every possible combination of options of a password is called ____. |
|
Definition
a. brute force attack * b. cracking c. password attack d. dictionary attack |
|
|
Term
The most common IP breach is the unlawful use or duplication of software-based intellectual property, more commonly known as ____. |
|
Definition
a. industrial espionage b. shoulder surfing c. competitive intelligence d. software piracy * |
|
|
Term
The primary function of the ____ layer is to provide reliable end-to-end transfer of data between user applications |
|
Definition
a. internal b. transport * c. routing d. network |
|
|
Term
The Web works via a(n) ____, an application that takes the requested information from the user or a Web resource, and presents it by integrating text, video, graphics, and sound through hyperlinks. |
|
Definition
a. URI b. web browser * c. xml d. IP address |
|
|
Term
The ____ layer is responsible for establishing, maintaining, and terminating communications sessions between two systems. Choose one answer. |
|
Definition
a. Control b. Session * c. Transport d. Network |
|
|
Term
____ is a network containing a dedicated server that connects systems within or between a few buildings, over a small geographic space. |
|
Definition
a. MAN b. WAN c. LAN * d. Servant Model |
|
|
Term
____ is used in public or semipublic settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing information from a distance. |
|
Definition
a. shoulder surfing * b. industrial espionage c. software piracy d. competitive intelligence |
|
|
Term
____ means that information is free from mistakes or errors and it has the value that the end user expects. |
|
Definition
a. Integrity b. Authenticity c. Accuracy * d. Possession |
|
|
Term
____ of information is the quality or state of having value for some purpose or end. |
|
Definition
a. Availability b. Utility * c. Integrity d. Possession |
|
|
Term
____ requires the protection of networking components, connections, and contents. |
|
Definition
a. Communications Security b. Personal Security c. Network Security * d. Operations Security |
|
|
Term
____ requires the protection of the people who are authorized to access the organization and its operations. |
|
Definition
a. Physical Security b. Personal Security * c. Operations Security d. Communications Security |
|
|