question archive Which of the following terms describes a network in which a connection is established and information follows the same path for the duration of the session? Packet-Switched Network POTS Circuit-Switched Network PSTN What is the maximum theoretical bandwidth that can be carried by an OC-12 SONET connection? 155
Subject:Computer SciencePrice: Bought3
Which of the following terms describes a network in which a connection is established and information follows the same path for the duration of the session?
Packet-Switched Network
POTS
Circuit-Switched Network
PSTN
What is the maximum theoretical bandwidth that can be carried by an OC-12 SONET connection?
155.52 Mbps
622.08 Mbps
2.488 Gbps
9.953 Gbps
What is the maximum theoretical bandwidth that can be carried by a T-3 copper connection?
1.544 Mbps
2.048 Mbps
34.368 Mbps
44.736 Mbps
Which of the technologies below is used in the backbone of most service providers, and is the underlying technology for digital subscriber line (DSL)? It differs from Internet traffic in that data is segmented into cells of a fixed 53 bytes size. The cells themselves are usually transmitted out of sequence and pieced back together at the other end of the connection.
ATM (Asynchronous Transfer Mode)
Frame Relay
MPLS (Multiprotocol Label Switching)
CSU/DSU
What is a high-performance, multi-service switching technology that is used in packet data networks that enables Layer 3 devices such as routers to establish and manage network traffic? This technology has succeeded other protocols as the dominate private WAN service, and while expensive, it has good reliability (up to 99.99%). Rather than long network addresses, it uses short path labels for route efficiency.
ATM (Asynchronous Transfer Mode)
Frame Relay
MPLS (Multiprotocol Label Switching)
CSU/DSU
Which of the following technologies uses high unused frequencies in telephone lines to establish a high-speed internet connection? This type of connection can be used to simultaneously surf the web and talk on the phone.
Cable
DSL
Satellite
ISDN
Which of the following technologies uses LOS (Line-of-Sight) communications and suffers from large amounts of latency in sending and receiving data?
Cable
DSL
Satellite
ISDN
Which of the following technologies is typically used in IoT devices used for home automation (e. g. smart locks, thermostats, appliances, smart lights, smart faucets)?
Zigbee
GSM
NFC
802.5g
Critical Thinking: Transport mode and Tunnel mode in IPSec are different ways to send information, in two or more sentences, explain the differences between them in terms of encryption, and tell which is more secure (2 points).
Which of the following IPSec Protocols only ensures integrity and authentication (i. e. it provides no confidentiality through encryption)?
ESP
DTLS
L2TP
AH
Which of the following is NOT a protocol associated with encrypting and/or sending data over a VPN tunnel?
IKEv2
SIP
L2TP
PPTP
Which of the following is a device used to securely create multiple VPN tunnels and route messages between VPN nodes? It is a routing device specifically designed to create and manage VPN communication infrastructure.
VPN Regulator
VPN Administrator
VPN Concentrator
VPN Terminator
Which of the following ports is associated with the SSH and SFTP services?
21
22
23
25
True or False: Telnet traffic including username and password to initiate the session is encrypted by default.
Which of the following services provides encrypted Desktop (GUI) access to a remote system?
RDP
VNC
FTP
BMC
Due to the potential impact of changes that can affect all users in an organization, and
considering that security vulnerabilities can arise from uncoordinated changes, what should an organization create to oversee changes?
change advisory board
incident response team
security control team
compliance department
Which of the following is NOT a biometric factor?
Fingerprint
Password
Iris Scan
Voice Recognition
From the lecture: A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:
Common Access Card (CAC)
Identity Validation Card (IVC)
Credential Validation Card (CVC)
Personal Credential Card (PCC)
What value refers to the average amount of time until a component fails, cannot be repaired, and must be replaced?
average time between failures (ATBF)
mean time to recovery (MTTR)
mean time between failures (MTBF)
median time between losses (MTBL)
From the lecture, if a cloud provider guarantees 99.99% up time in their SLA, how long per year can they be down?
87 hours and 36 minutes (3.65 days)
8 hours, 45 minutes, and 36 seconds
52 minutes and 34 seconds
5 minutes and 15 seconds
Which of the following is a location that provides office space, but the customer must provide and install all the equipment needed to continue operations?
cold site
hot site
spare site
warm site
Which of the following backups is a backup of all company files and folders made to be able to restore the data of an organization in the event of a natural disaster or cybersecurity incident?
Image
Full
Incremental
Differential
Which subject can be found in an MSDS?
DRM & Licensing
Patching & OS Updates
Health & Hazard Information
Security best practices
Which of the following acronyms applies to a policy that specifies what an employee can and cannot do with company devices?
EULA
AUP
DRM
OEM