Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Media Study
Q:
Regarding retention policies, firms need to ________.
A) implement strong and clear backup policies
B) specify how long data will be retained
C) ensure implementation is compliant with policies through periodic audits
D) All of the above
Q:
Backup policies should be audited regularly and include tracing what happens in samples of data.
Q:
Backup media should be encrypted.
Q:
Backup creation policies should specify ________.
A) what data should be backed up
B) backup restoration tests
C) Both A and B
D) Neither A nor B
Q:
With RAID 5, the following is achieved ________.
A) Parity
B) Striping
C) Redundancy
D) All of the above
Q:
Another name for RAID 5 is ________.
A) Mirroring
B) Distributed Parity
C) Striping
D) None of the above.
Q:
Another name for RAID 1 is ________.
A) Mirroring
B) Distributed Parity
C) Striping
D) None of the above
Q:
With RAID 1, the following is achieved ________.
A) Redundancy
B) Striping
C) Both A and B.
D) Neither A nor B.
Q:
Another name for RAID 0 is ________.
A) Mirroring
B) Distributed Parity
C) Striping
D) None of the above
Q:
A system using an array of drives increases reliability.
Q:
Configuring multiple hard drives as an array within a single system is ________.
A) a common method of increasing reliability
B) a common method of increasing speed
C) Both A and B
D) Neither A nor B
Q:
Writing data to an array of hard drives has several advantages over writing to a single drive.
Q:
Optical disks can safely hold data for decades.
Q:
A dual-layer DVD can hold up to about ________ GB.
A) 4
B) 8
C) 12
D) 64
Q:
Backing up data to a second hard drive on a computer is more expensive than backup onto to magnetic tape.
Q:
Backup onto another hard drive is a very slow method of backup.
Q:
Magnetic tape is ________.
A) expensive to use
B) very fast
C) Both A and B
D) Neither A nor B
Q:
Magnetic tape can store large amounts of data at the lowest cost per bit of any backup medium.
Q:
Backed-up data must be physically stored on something.
Q:
Mesh backup is where client PCs in an organization back up each other.
Q:
With CDP, each location backs up the other in real time.
Q:
CDP requires expensive high-speed transmission link between the sites.
Q:
With centralized backup, each location backs up the other in real time.
Q:
CDP is inexpensive to use.
Q:
Two computer systems each back up the other in real time in ________.
A) CDP
B) full duplex backup
C) full backup
D) All of the above
Q:
With local backup processes, policies are easily enforced.
Q:
Compared to local backup, centralized backup ________.
A) is more capable of enforcing backup policy
B) is more capable of auditing backup policy
C) Both A and B
D) Neither A nor B
Q:
Incremental backups are usually discarded after the next full backup.
Q:
Incremental and full backups may be restored out of order in which they were created.
Q:
Incremental and full backups must be restored in the order in which they were created.
Q:
Differential backups only back up data that has changed since the most recent full backup.
Q:
________ backups only back up data that has changed since the most recent full backup.
A) Differential
B) Incremental
C) Delta
D) None of the above
Q:
Most companies conduct full backups on a daily basis.
Q:
Full backups are ________.
A) performed on all files and directories
B) slow
C) typically done weekly
D) All of the above
Q:
Companies usually conduct full backups on a ________ basis.
A) hourly
B) daily
C) weekly
D) monthly
Q:
Typically, having enough shadow backup space for a few days is sufficient.
Q:
Typically, the shadow storage space is nearly unlimited.
Q:
Normally, there is no limit on how long shadowing may maintain backed up files.
Q:
________ allows for very recent file changes to be restored.
A) Shadowing
B) File backup
C) File/folder backup
D) Image backup
Q:
The process of keeping a backup copy of each file being worked on by backing it up every few minutes is called ________.
A) file backup
B) file/folder backup
C) image backup
D) shadowing
Q:
With image backup, even if the entire hard drive is lost, its content can be restored onto the same machine or a different machine.
Q:
Image backup is a fast form of backups.
Q:
Image backup is attractive because ________.
A) it requires minimal additional work to restore a fully functioning PC
B) it is faster than file/directory backup
C) it takes up less storage space than file/directory backup
D) Both A and C
Q:
File/directory backup is slower and takes up more storage space than image backup.
Q:
File/directory data backup copies data, programs, configurations, and registry settings.
Q:
File/directory data backup copies ________.
A) programs
B) data
C) registry settings
D) Both A and B.
Q:
Data can be lost by ________.
A) mechanical failure
B) environmental casualties
C) malware
D) All of the above
Q:
Properly backed up data includes ________.
A) ensuring that copies of data files are stored safely and secured
B) ensuring that copies of data files will survive even if the data on the host are lost and damaged
C) Both A and B
D) Neither A nor B
Q:
Properly hardened hosts and securely coded applications can help protect data while it is processed.
Q:
Properly hardened hosts and securely coded applications can help protect data while it is transmitted.
Q:
Using a secure cryptographic system can prevent attacks while data is being processed.
Q:
Using a secure cryptographic system can prevent attacks while data is being transmitted.
Q:
Another name for data is raw facts.
Q:
Data is the principal element of any information system.
Q:
Which version of SNMP allows the manager to have a different shared secret with each agent?
A) Version 1
B) Version 2
C) Version 3
D) All of the above
Q:
DNS, DHCP, and LDAP are examples of supervisory protocols in TCP/IP.
Q:
________ introduced community strings for security, in which a shared secret was used to authenticate messages.
A) SNMP V1
B) SNMP V2
C) SNMP V3
D) None of the above
Q:
________ offers no security at all.
A) SNMP V1
B) SNMP V2
C) SNMP V3
D) All of the above offer security.
Q:
To satisfy legal retention and other compliance regulations, companies should use ________ in IM.
A) a presence server
B) a relay server
C) Either A or B
D) Neither A nor B
Q:
In IM, all messages pass through a ________ server.
A) relay
B) presence
C) Both A and B
D) Neither A nor B
Q:
In IM, ________ servers allow two users to locate each other.
A) index
B) relay
C) presence
D) All of the above
Q:
Skype's file transfer generally does not work with antivirus programs.
Q:
The Skype protocol is relatively easy for corporate firewalls to filter.
Q:
Which of the following statements accurately describes Skype?
A) Skype controls who can register a particular person's name.
B) Skype cannot decrypt or read user traffic.
C) Skype's proprietary software and protocols have not been publicly studied and approved.
D) None of the above
Q:
Skype can decrypt and read user traffic.
Q:
Skype's security protocols have been publicly studied and approved.
Q:
If NAT changes the Layer 3 IP destination addresses, the protocol will still work properly.
Q:
________ is a VoIP service that currently offers free calling among its customers over the Internet and reduced-cost calling to and from Public Switched Telephone Network customers.
A) Skype
B) SIP
C) SPIT
D) IM
Q:
VoIP traffic and data traffic tend to be segregated from each other on a network for added security.
A) True.
B) False. This would increase costs too much.
C) False. This would negate the benefits of convergence.
Q:
NAT adds latency to VoIP packets.
Q:
Firewall port openings are required for SIP/H.323 messages.
Q:
SIP requires port ________ to be open.
A) 47
B) 505
C) 3434
D) 5060
Q:
In VoIP, firewalls are a problem because they tend to ________.
A) reduce throughput
B) increase jitter
C) increase latency
D) make traffic unreadable
Q:
H.323 uses Ports 1719 and 1720
Q:
In VoIP, encryption may ________.
A) reduce throughput
B) increase jitter
C) increase latency
D) make traffic unreadable
Q:
Eavesdropping can be thwarted by encrypting ________.
A) signaling traffic
B) transport traffic
C) Both A and B
D) Neither A nor B
Q:
SIP Identity protocols ________.
A) ensure that traffic is authenticated between two companies holding public/private keys
B) are uncommon on IP telephones
C) Both A and B
D) Neither A nor B
Q:
VoIP security can easily be implemented even if the company's basic security is weak.
Q:
SIP identity protocols are common on IP telephones.
Q:
SPIT is where the attacker uses the corporate VoIP network to place free calls.