Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Certified Information Systems Security Professional (CISSP)
Quiz 3: Communication
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
What technology is a portion of the 802.15 standard and has a transfer rate of 1-to-3 Mbps within a ten meter range?
Question 22
Multiple Choice
If wireless connectivity between different locations are to take place via satellite links, they must be within the satellite's_________?
Question 23
Multiple Choice
Baseband uses an entire communication channel for its transmissions. What divides the communication channel into individual and independent channels?
Question 24
Multiple Choice
Ethernet is as a LAN-sharing technology that enables several devices to communicate on the same networks. How fast does Fast Ethernet go?
Question 25
Multiple Choice
There are two main types of coaxial cable used within LAN environments, 50-ohm cable and 75-ohm cable. What is the core of these cables?
Question 26
Multiple Choice
What has the capability that allows a protocol to distinguish between different classes of messages and assign priority levels?
Question 27
Multiple Choice
Which of the following protocols operates on 2.4GHz and has a bandwidth of 1Mbps or 2Mbps?
Question 28
Multiple Choice
Rebecca wishes to control how data can flow into and out of her network. She spoke to her boss about problems the office is experiencing with data flow. He took it upon himself to purchase a program, but the program cannot prevent attacks that employ application-specific vulnerabilities. What did the boss purchase?
Question 29
Multiple Choice
Rebecca returned the Packet-filtering Firewall that she bought to control the data that can flow into and out of a network. Instead, Rebecca went and bought the fifth-generation firewall that creates dynamic, customized TCP/IP stacks when a packet needs to be evaluated. What firewall did Rebecca purchase?
Question 30
Multiple Choice
What is the main gate between users and corporate web-based resources?
Question 31
Multiple Choice
What is the first line of defense for a network's security and is another name for a locked-down system?
Question 32
Multiple Choice
Which of the following specifies why Shared Key authentication is considered a security risk?
Question 33
Multiple Choice
Why is SSID filtering not considered a secure form of access control?
Question 34
Multiple Choice
Why should access points be connected to switches instead of hubs?
Question 35
Multiple Choice
Which of the following wireless LAN user authentication methods provides maximum security?
Question 36
Multiple Choice
What type of protocol is used by remote users to authenticate over PPP lines and is the least secure authentication method?
Question 37
Multiple Choice
Applications need to be able to interact with information stored in databases for data to be useful. What application programming interface language allows an application to communicate with a database either locally or remotely?