Shared Flashcard Set

Details

Guide to Firewalls and VPNs, 3rd Edition Quiz 1
Guide to Firewalls and VPNs, 3rd Edition
20
Computer Networking
Undergraduate 1
09/29/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
____ is the effect of one communications channel upon another. Crosstalk occurs when one transmission “bleeds” over to another.
Definition
a. Crosstalk *
b. Jitter
c. Echo
d. Distortion
Term
____ prepares an organization to reestablish critical business operations during a disaster that affects operations at the primary site.
Definition
a. Incident Response Planning
b. Disaster Recovery Planning
c. Developing Continuity
d. Business Continuity Planning *
Term
A ____ SysSP document is created by management to guide the implementation and configuration of technology as well as to regulate the behavior of people in the organization.
Definition
a. technical specifications
b. managerial guidance *
c. policy management
d. configuration rule policy
Term
A(n) ____ hacks the public telephone network to make free calls or disrupt services.
Definition
a. cracker
b. phreaker *
c. packet monkey
d. elite
Term
A(n) ____ is also known as a general security policy, IT security policy, or information security policy.
Definition
a. Issue-Specific Security Policy (ISSP)
b. System-Specific Policy (SysSP)
c. information security policy
d. Enterprise Information Security Policy (EISP) *
Term
A(n) ____ is an object, person, or other entity that represents a constant danger to an asset.
Definition
a. attack
b. threat *
c. error
d. failure
Term
A(n) ____ network uses a logical ring topology and require stations to possess a token — essentially a data frame with no data — prior to being allowed to transmit data.
Definition
a. frame relay
b. token ring *
c. ATM
d. FDDI
Term
Attempting to reverse-calculate a password is often called ____.
Definition
a. cracking *
b. dictionary attack
c. password attack
d. brute force attack
Term
The ____ serves to reinforce the position of the U.S. government and industry while helping to ensure the safety and the health of consumers and ensuring environmental protection.
Definition
a. International Telecommunication Union
b. Institute of Electrical and Electronics Engineers
c. American National Standards Institute *
d. Telecommunications Industry Association
Term
The application of computing and network resources to try every possible combination of options of a password is called ____.
Definition
a. brute force attack *
b. cracking
c. password attack
d. dictionary attack
Term
The most common IP breach is the unlawful use or duplication of software-based intellectual property, more commonly known as ____.
Definition
a. industrial espionage
b. shoulder surfing
c. competitive intelligence
d. software piracy *
Term
The primary function of the ____ layer is to provide reliable end-to-end transfer of
data between user applications
Definition
a. internal
b. transport *
c. routing
d. network
Term
The Web works via a(n) ____, an application that takes the requested information from the user or a Web resource, and presents it by integrating text, video, graphics, and sound through hyperlinks.
Definition
a. URI
b. web browser *
c. xml
d. IP address
Term
The ____ layer is responsible for establishing, maintaining, and terminating communications sessions between two systems.
Choose one answer.
Definition
a. Control
b. Session *
c. Transport
d. Network
Term
____ is a network containing a dedicated server that connects systems within or between a few buildings, over a small geographic space.
Definition
a. MAN
b. WAN
c. LAN *
d. Servant Model
Term
____ is used in public or semipublic settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing information from a distance.
Definition
a. shoulder surfing *
b. industrial espionage
c. software piracy
d. competitive intelligence
Term
____ means that information is free from mistakes or errors and it has the value that the end user expects.
Definition
a. Integrity
b. Authenticity
c. Accuracy *
d. Possession
Term
____ of information is the quality or state of having value for some purpose or end.
Definition
a. Availability
b. Utility *
c. Integrity
d. Possession
Term
____ requires the protection of networking components, connections, and contents.
Definition
a. Communications Security
b. Personal Security
c. Network Security *
d. Operations Security
Term
____ requires the protection of the people who are authorized to access the organization and its operations.
Definition
a. Physical Security
b. Personal Security *
c. Operations Security
d. Communications Security
Supporting users have an ad free experience!