1 out of 1 points
___________ is the process of transforming data from cleartext into
ciphertext.
Answer
Selected
Answer: Encrypti
on
Correct
Answer: Encrypti
on
Question 2
1 out of 1 points
What term is used to describe the amount of time that an IT system,
application, or data is not available to users?
Answer
Selected
Answer: downti
me
Correct
Answer: downti
me
Question 3
0 out of 1 points
The tunnel can be created between a remote workstation using the
public Internet and a VPN router or a secure browser and ________ Web
site.
Answer
Selected
Answer: Hypertext Transfer Protocol (HTTP)
Correct
Answer: Secure Sockets Layer virtual private network
(SSL-VPN)
Question 4
0 out of 1 points
A ________ examines the network layer address and routes packets
based on routing protocol path determination decisions.
Answer
Selected
Answer: proxy
server
1 / 4
Correct
Answer: Layer 3
switch
Question 5
1 out of 1 points
Which of the following is the definition of ciphertext?
Answer
Selected
Answer: The opposite of cleartext. Data sent as ciphertext is not
visible and not decipherable.
Correct
Answer: The opposite of cleartext. Data sent as ciphertext is not
visible and not decipherable.
Question 6
0 out of 1 points
What fills security gaps and software weaknesses?
Answer
Selected
Answer: Cybersecurity
Correct
Answer: Testing and quality
assurance
Question 7
1 out of 1 points
Software vendors must protect themselves from the liabilities of their
own vulnerabilities with a(n) ____________.
Answer
Selected
Answer: End-User License Agreement
(EULA)
Correct
Answer: End-User License Agreement
(EULA)
Question 8
1 out of 1 points
Today, people working in cyberspace must deal with new and
constantly evolving ________.
Answer
Selected
Answer: threa
ts
2 / 4
Correct
Answer: threa
ts
Question 9
1 out of 1 points
The director of IT security is generally in charge of ensuring that the
____________ conforms to policy.
Answer
Selected
Answer: Workstation
Domain
Correct
Answer: Workstation
Domain
Question 10
0 out of 1 points
A ________ is a collection of computers connected to one another or to
a common connection medium.
Answer
Selected
Answer: virtual private network
(VPN)
Correct
Answer: local area network
(LAN)
Question 11
0 out of 1 points
What term is used to describe streamlining processes with automation
or simplified steps?
Answer
Selected
Answer: protocol convergence
Correct
Answer: business process
engineering
Question 12
1 out of 1 points
E-commerce changed how businesses sell, and the ________ changed
how they market.
Answer
Selected
Answer:
3 / 4
Intern
et
Correct
Answer: Intern
et
Question 13
1 out of 1 points
A common DSL service is ________, where the bandwidth is different
for downstream and upstream traffic.
Answer
Selected
Answer: asymmetric digital subscriber line
(ADSL)
Correct
Answer: asymmetric digital subscriber line
(ADSL)
Question 14
0 out of 1 points
What is meant by DS0?
Answer
Selected
Answer: A strategy that uses a device to provide electrical power for
IP phones from the RJ-45 8-pin jacks directly to the
workstation outlet.
Correct
Answer: A basic digital signaling rate that corresponds to one voicefrequency-equivalent channel.
Question 15
1 out of 1 points
Voice and unified communications are ________ applications that use
64-byte IP packets.
Answer
Selected
Answer: realtime
Correct
Answer: realtime
Question 16
1 out of 1 points
Powered by qwivy(www.qwivy.org)
4 / 4
Version | 2021 |
Category | Exam (elaborations) |
Included files | |
Authors | qwivy.com |
Pages | 34 |
Language | English |
Comments | 0 |
Sales | 0 |
{{ userMessage }}