Mid Term CIS 333
Which technology of the following supports the convergence of voice, video, and data
communication streams across a split channel?
Answer
Time Division Multiplexing
Question 2
Session Initiation Protocol (SIP) supports which of the following?
Answer
All of the above
Question 3
Which of the following is a weakness that allows a threat to be realized or to have an effect on an
asset?
Answer
Vulnerability
Question 4
In which domain of a typical IT infrastructure do service level agreements (SLAs) figure
prominently?
Answer
WAN
Question 5
Which domain of a typical IT infrastructure includes cabling, servers, and wireless access points?
Answer
LAN
Question 6
This study source was downloaded by 100000817935606 from qwivy.com on 01-04-2022 04:06:13 GMT -06:00
https://www.qwivy.com/file/13067117/Mid-Term-Cis-333/
1 / 2
An AUP is part of a layered approach to security and it supports confidentiality. What else
supports confidentiality?
Answer
Data classification standards
Question 7
Which law requires all types of financial institutions to protect customers' private financial
information?
Answer
GLBA
Question 8
Which of the following is any weakness in a system that makes it possible for a threat to cause it
harm?
Answer
Vulnerability
Question 9
What is a characteristic of VoIP?
Answer
Uses the same physical network as data
Offers economy of scale
Both A and B
Question 10
What is phreaking most often associated with?
Answer
Telephone system
Question 11
What does a lapse in a security control or policy create?
This study source was downloaded by 100000817935606 from qwivy.com on 01-04-2022 04:06:13 GMT -06:00
https://www.qwivy.com/file/13067117/Mid-Term-Cis-333/
Powered by qwivy(www.qwivy.org)
2 / 2
Version | latest |
Category | Exam (elaborations) |
Included files | |
Authors | qwivy.com |
Pages | 8 |
Language | English |
Comments | 0 |
Sales | 0 |
{{ userMessage }}