Test 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is true of business continuity plans (BCPs) and disaster recovery plans (DRPs)?

A DRP is a part of a BCP.

What is meant by risk register?

A list of identified risks that results from the risk-identification process

What is a high-speed broadband networking technology that uses a 53-byte cell to support real-time voice, video, or data communications?

Asynchronous transfer mode (ATM)

____________ is the practice of hiding data and keeping it invisible to unauthorized users.

Cryptography

What is a software-based application, such as WebEx, that supports audio conferencing and sharing of documents (text, spreadsheets, presentations, etc.) for real-time discussions with team members or colleagues?

Collaboration

The term "risk methodology" refers to a list of identified risks that result from the risk-identification process.

False

Until the mid-1980s, personal and business communications involved telephones, answering machines and voicemail, and the Internet.

False

Voice mail and e-mail are examples of real-time communications.

False

What term describes a packet-based WAN service capable of supporting one-to-many and many-to-many WAN connections?

Frame relay

E-commerce changed how businesses sell, and the ________ changed how they market.

Internet

What term describes a technology that uses a device to provide electrical power for IP phones from an RJ-45 8-pin jack directly to a workstation outlet?

Power over Ethernet (PoE)

What name is given to a risk-analysis method that uses relative ranking to determine risk responses?

Qualitative risk analysis

Regarding a business impact analysis (BIA), the recovery point objective (RPO) identifies the amount of _________ that is acceptable.

data loss

A ___________ defines how a business gets back on its feet after a major disaster like a fire or hurricane.

disaster recovery plan (DRP)

Medical practices and hospitals realized early on that ________ provide(s) the ability to provide access to necessary information without having to invest in many computers and network infrastructure.

mobile devices

When you accept a __________, you take no further steps to resolve it.

negative risk

Risks apply to specific assets. If you multiply the risk __________ by the cost of the asset, the result is the exposure to a specific risk.

probability

With wireless LANs (WLANs), radio transceivers are used to transmit IP packets from a WLAN network interface card to a(n) _____________.

wireless access point (WAP)

Software vendors must protect themselves from the liabilities of their own vulnerabilities with a(n) ____________.

End-User License Agreement (EULA)

A security awareness policy defines what actions are and are not allowed with respect to the use of organization-owned IT assets.

False

Security controls do not need to be implemented to secure Voice over IP (VoIP) and Session Initiation Protocol (SIP) on LANs and WANs.

False

The Delphi method is a calculation for estimating loss due to a specific realized threat.

False

Digital communications have a much higher bit error rate than analog communications.

True

Human latency is the amount of time humans take to consider input or correspondence, take action, and then respond.

True

Hypertext Transfer Protocol (HTTP) is the communications protocol between Web browsers and Web sites with data in cleartext.

True

In risk analysis, the percentage of loss for each realized threat against a resource is referred to as the exposure factor (EF).

True

Mobile devices use only cellular connections to connect to networks.

True

Primary issues involved with mobile computing are network speed, usability, and security.

True

Regarding risk analysis, the term "single loss expectancy (SLE)" is the loss for a single threat occurrence.

True

The tools for conducting a risk analysis can include the documents that define, categorize, and rank risks.

True

Today's LAN standard is the Institute of Electrical and Electronics Engineers (IEEE) 802.3.

True

When voice signals converted from analog to digital, voice and data communications had to travel on different circuits.

True

During the late 1980s into the early 1990s, service providers converted the core switches at their central offices from ______________ to digital central office (CO) switches.

analog

A ___________ addresses primarily the processes, resources, equipment, and devices needed to continue conducting critical business activities when an interruption occurs that affects the business's viability.

business continuity plan (BCP)

Guarding information from everyone except those with rights to it is the definition of __________.

confidentiality


Ensembles d'études connexes

La Peinture Française du XIXe Siècle (Midterm)

View Set

Evolve Review Questions for Unit 2

View Set

Gov. Exam 2 Review (Chapters 4,5 and 6)

View Set

Exam 3: High-Risk Postpartum NCLEX Questions

View Set

RAD SEMINAR REVIEW: VERTEBRAL COLUMN & PELVIS

View Set

Module 2 / Unit 1 - Using Data Types and Units

View Set

Chapter 11: Essential Peripherals

View Set