question archive Which of the following terms describes a network in which a connection is established and information follows the same path for the duration of the session? Packet-Switched Network POTS Circuit-Switched Network PSTN What is the maximum theoretical bandwidth that can be carried by an OC-12 SONET connection? 155

Which of the following terms describes a network in which a connection is established and information follows the same path for the duration of the session? Packet-Switched Network POTS Circuit-Switched Network PSTN What is the maximum theoretical bandwidth that can be carried by an OC-12 SONET connection? 155

Subject:Computer SciencePrice: Bought3

Which of the following terms describes a network in which a connection is established and information follows the same path for the duration of the session?

Packet-Switched Network

POTS

Circuit-Switched Network

PSTN

What is the maximum theoretical bandwidth that can be carried by an OC-12 SONET connection?

155.52 Mbps

622.08 Mbps

2.488 Gbps

9.953 Gbps

What is the maximum theoretical bandwidth that can be carried by a T-3 copper connection?

1.544 Mbps

2.048 Mbps

34.368 Mbps

44.736 Mbps

Which of the technologies below is used in the backbone of most service providers, and is the underlying technology for digital subscriber line (DSL)? It differs from Internet traffic in that data is segmented into cells of a fixed 53 bytes size. The cells themselves are usually transmitted out of sequence and pieced back together at the other end of the connection.

ATM (Asynchronous Transfer Mode)

Frame Relay

MPLS (Multiprotocol Label Switching)

CSU/DSU

 

 

What is a high-performance, multi-service switching technology that is used in packet data networks that enables Layer 3 devices such as routers to establish and manage network traffic? This technology has succeeded other protocols as the dominate private WAN service, and while expensive, it has good reliability (up to 99.99%). Rather than long network addresses, it uses short path labels for route efficiency.

ATM (Asynchronous Transfer Mode)

Frame Relay

MPLS (Multiprotocol Label Switching)

CSU/DSU

Which of the following technologies uses high unused frequencies in telephone lines to establish a high-speed internet connection? This type of connection can be used to simultaneously surf the web and talk on the phone.

Cable

DSL

Satellite

ISDN

Which of the following technologies uses LOS (Line-of-Sight) communications and suffers from large amounts of latency in sending and receiving data?

Cable

DSL

Satellite

ISDN

Which of the following technologies is typically used in IoT devices used for home automation (e. g. smart locks, thermostats, appliances, smart lights, smart faucets)?

Zigbee

GSM

NFC

802.5g

Critical Thinking: Transport mode and Tunnel mode in IPSec are different ways to send information, in two or more sentences, explain the differences between them in terms of encryption, and tell which is more secure (2 points).

 

 

 

 

 

Which of the following IPSec Protocols only ensures integrity and authentication (i. e. it provides no confidentiality through encryption)?

ESP

DTLS

L2TP

AH

Which of the following is NOT a protocol associated with encrypting and/or sending data over a VPN tunnel?

IKEv2

SIP

L2TP

PPTP

Which of the following is a device used to securely create multiple VPN tunnels and route messages between VPN nodes? It is a routing device specifically designed to create and manage VPN communication infrastructure.

VPN Regulator

VPN Administrator

VPN Concentrator

VPN Terminator

Which of the following ports is associated with the SSH and SFTP services?

21

22

23

25

True or False: Telnet traffic including username and password to initiate the session is encrypted by default.

Which of the following services provides encrypted Desktop (GUI) access to a remote system?

RDP

VNC

FTP

BMC

Due to the potential impact of changes that can affect all users in an organization, and

considering that security vulnerabilities can arise from uncoordinated changes, what should an organization create to oversee changes?

change advisory board

incident response team

security control team

compliance department

Which of the following is NOT a biometric factor?

Fingerprint

Password

Iris Scan

Voice Recognition

From the lecture: A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

Common Access Card (CAC)

Identity Validation Card (IVC)

Credential Validation Card (CVC)

Personal Credential Card (PCC)

What value refers to the average amount of time until a component fails, cannot be repaired, and must be replaced?

average time between failures (ATBF)

mean time to recovery (MTTR)

mean time between failures (MTBF)

median time between losses (MTBL)

From the lecture, if a cloud provider guarantees 99.99% up time in their SLA, how long per year can they be down?

87 hours and 36 minutes (3.65 days)

8 hours, 45 minutes, and 36 seconds

52 minutes and 34 seconds

5 minutes and 15 seconds

Which of the following is a location that provides office space, but the customer must provide and install all the equipment needed to continue operations?

cold site

hot site

spare site

warm site

Which of the following backups is a backup of all company files and folders made to be able to restore the data of an organization in the event of a natural disaster or cybersecurity incident?

Image

Full

Incremental

Differential

Which subject can be found in an MSDS?

DRM & Licensing

Patching & OS Updates

Health & Hazard Information

Security best practices

Which of the following acronyms applies to a policy that specifies what an employee can and cannot do with company devices?

EULA

AUP

DRM

OEM

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE