CIS 333 Pre Assessment Exam Questions and Answers Summer

CIS 333 Pre Assessment Exam Questions and Answers Summer

CIS 333 Pre Assessment Exam Questions and Answers Summer /CIS 333 Pre Assessment Exam Questions and Answers Summer /CIS 333 Pre Assessment Exam Questions and Answers Summer /CIS 333 Pre Assessment Exam Questions and Answers Summer /CIS 333 Pre Assessment Exam Questions and Answers Summer

 Question 1

1 out of 1 points

The act of transforming cleartext data into undecipherable ciphertext is

the definition of __________.

Selected

Answer: encrypti

on

Correct

Answer: encrypti

on

 Question 2

1 out of 1 points

SIP is a ___________ protocol used to support real-time communications.

Selected

Answer: signali

ng

Correct

Answer: signali

ng

 Question 3

1 out of 1 points

This security appliance examines IP data streams for common attack and

malicious intent patterns.

Selected

Answer: intrusion detection

system (IDS)

Correct

Answer: intrusion detection

system (IDS)

 Question 4

1 out of 1 points

The ________ is where the fourth layer of defense is required.

Selected

Answer: LAN-to-WAN

Domain

Correct

Answer: LAN-to-WAN

Domain

 Question 5

1 out of 1 points

____________ is the amount of time it takes to recover and make a system,

application, and data available for use after an outage.

 1 / 4

Selected

Answer: Recovery time objective

(RTO)

Correct

Answer: Recovery time objective

(RTO)

 Question 6

1 out of 1 points

The physical part of the LAN Domain includes a __________, which is an

interface between the computer and the LAN physical media.

Selected

Answer: network interface card

(NIC)

Correct

Answer: network interface card

(NIC)

 Question 7

1 out of 1 points

A ___________ defines how a business gets back on its feet after a major

disaster like a fire or hurricane.

Selected

Answer: disaster recovery plan

(DRP)

Correct

Answer: disaster recovery plan

(DRP)

 Question 8

1 out of 1 points

With wireless LANs (WLANs), radio transceivers are used to transmit IP

packets from a WLAN NIC to a _____________.

Selected

Answer: wireless access point

(WAP)

Correct

Answer: wireless access point

(WAP)

 Question 9

1 out of 1 points

___________ is the process of transforming data from cleartext into

ciphertext.

Selected

Answer:

 2 / 4

Encrypti

on

Correct

Answer: Encrypti

on

 Question 10

1 out of 1 points

Software vendors must protect themselves from the liabilities of their own

vulnerabilities with a(n) ____________.

Selected

Answer: End-User License Agreement

(EULA)

Correct

Answer: End-User License Agreement

(EULA)

 Question 11

0 out of 1 points

To satisfy the demands of a growing number of mobile devices and users of

3G, new networks emerged. These new 4G networks use IP addressing and

eliminated remaining __________.

Selected

Answer: denial of service

(DoS)

Correct

Answer: circuit switching

 Question 12

1 out of 1 points

What name is given to an attack that uses ping or ICMP echo-request,

echo-reply messages to bring down the availability of a server or system?

Selected

Answer: denial of service

(DoS)

Correct

Answer: denial of service

(DoS)

 Question 13

1 out of 1 points

The total number of errors divided by the total number of bits transmitted

is the definition of __________.

Selected

Answer: bit error

 3 / 4

rate

Correct

Answer: bit error

rate

 Question 14

1 out of 1 points

As users upgrade LANs to GigE or 10GigE, switches must support ________

and data IP traffic.

Selected

Answer: voic

e

Correct

Answer: voic

e

 Question 15

1 out of 1 points

Network devices can implement ___________ to better support VoIP and SIP

IP packets and reduce dropped calls and delays.

Selected

Answer: traffic

prioritization

Correct

Answer: traffic

prioritization

 Question 16

1 out of 1 points

What is meant by digital subscriber line (DSL)?

Selected

Answer: A high-speed digital broadband service that uses copper

cabling for Internet access.

Correct

Answer: A high-speed digital broadband service that uses copper

cabling for Internet access.

 Question 17

1 out of 1 points

What term is used to describe streamlining processes with automation or

simplified steps?

Selected

Answer: business process

engineering

Correct

Powered by qwivy(www.qwivy.org)

 4 / 4

No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Version latest
Category Exam (elaborations)
Included files pdf
Authors qwivy.com
Pages 31
Language English
Comments 0
Sales 0
Similar items
cover
Qwivy.com 24 pages English
$15.00
cover
Walden University 7 pages English
$9.89
cover
Qwivy.com 24 pages English
$15.00
Recently viewed items

We use cookies to understand how you use our website and to improve your experience. This includes personalizing content and advertising. To learn more, please click Here. By continuing to use our website, you accept our use of cookies, Privacy policy and terms & conditions.

Processing