Test 1
Which of the following is true of business continuity plans (BCPs) and disaster recovery plans (DRPs)?
A DRP is a part of a BCP.
What is meant by risk register?
A list of identified risks that results from the risk-identification process
What is a high-speed broadband networking technology that uses a 53-byte cell to support real-time voice, video, or data communications?
Asynchronous transfer mode (ATM)
____________ is the practice of hiding data and keeping it invisible to unauthorized users.
Cryptography
What is a software-based application, such as WebEx, that supports audio conferencing and sharing of documents (text, spreadsheets, presentations, etc.) for real-time discussions with team members or colleagues?
Collaboration
The term "risk methodology" refers to a list of identified risks that result from the risk-identification process.
False
Until the mid-1980s, personal and business communications involved telephones, answering machines and voicemail, and the Internet.
False
Voice mail and e-mail are examples of real-time communications.
False
What term describes a packet-based WAN service capable of supporting one-to-many and many-to-many WAN connections?
Frame relay
E-commerce changed how businesses sell, and the ________ changed how they market.
Internet
What term describes a technology that uses a device to provide electrical power for IP phones from an RJ-45 8-pin jack directly to a workstation outlet?
Power over Ethernet (PoE)
What name is given to a risk-analysis method that uses relative ranking to determine risk responses?
Qualitative risk analysis
Regarding a business impact analysis (BIA), the recovery point objective (RPO) identifies the amount of _________ that is acceptable.
data loss
A ___________ defines how a business gets back on its feet after a major disaster like a fire or hurricane.
disaster recovery plan (DRP)
Medical practices and hospitals realized early on that ________ provide(s) the ability to provide access to necessary information without having to invest in many computers and network infrastructure.
mobile devices
When you accept a __________, you take no further steps to resolve it.
negative risk
Risks apply to specific assets. If you multiply the risk __________ by the cost of the asset, the result is the exposure to a specific risk.
probability
With wireless LANs (WLANs), radio transceivers are used to transmit IP packets from a WLAN network interface card to a(n) _____________.
wireless access point (WAP)
Software vendors must protect themselves from the liabilities of their own vulnerabilities with a(n) ____________.
End-User License Agreement (EULA)
A security awareness policy defines what actions are and are not allowed with respect to the use of organization-owned IT assets.
False
Security controls do not need to be implemented to secure Voice over IP (VoIP) and Session Initiation Protocol (SIP) on LANs and WANs.
False
The Delphi method is a calculation for estimating loss due to a specific realized threat.
False
Digital communications have a much higher bit error rate than analog communications.
True
Human latency is the amount of time humans take to consider input or correspondence, take action, and then respond.
True
Hypertext Transfer Protocol (HTTP) is the communications protocol between Web browsers and Web sites with data in cleartext.
True
In risk analysis, the percentage of loss for each realized threat against a resource is referred to as the exposure factor (EF).
True
Mobile devices use only cellular connections to connect to networks.
True
Primary issues involved with mobile computing are network speed, usability, and security.
True
Regarding risk analysis, the term "single loss expectancy (SLE)" is the loss for a single threat occurrence.
True
The tools for conducting a risk analysis can include the documents that define, categorize, and rank risks.
True
Today's LAN standard is the Institute of Electrical and Electronics Engineers (IEEE) 802.3.
True
When voice signals converted from analog to digital, voice and data communications had to travel on different circuits.
True
During the late 1980s into the early 1990s, service providers converted the core switches at their central offices from ______________ to digital central office (CO) switches.
analog
A ___________ addresses primarily the processes, resources, equipment, and devices needed to continue conducting critical business activities when an interruption occurs that affects the business's viability.
business continuity plan (BCP)
Guarding information from everyone except those with rights to it is the definition of __________.
confidentiality