SET 9 SSCP practice questions WGU C845 Leave the first rating Students also studied Terms in this set (86) Science Computer Science Computer Security and Reliability Save C839v5/D334 Additional Practice Teacher 165 terms ShawnD_Preview D278 Exam Prep 53 terms Sergeantsavage1 Preview C839v5/D334 Algorithms Drill Teacher 51 terms ShawnD_Preview WGU - 85 terms Pon Which of the following type of cryptography is used when both parties use the same key to communicate securely with each other?
- Symmetric Key Cryptography
- PKI - Public Key Infrastructure
- Diffie-Hellman
- DSS - Digital Signature Standard
- Symmetric Key Cryptography
- A firewall is a not a necessity in today's connected
- A firewall is a necessity in today's connected world.
- A whitewall is a necessity in today's connected world.
- A black firewall is a necessity in today's connected
- A firewall is a necessity in today's connected world.
- Sendback systems
- Callback forward systems
- Callback systems
- Sendback forward systems
- callback systems
- Crosstalk
- Noise
- Delay distortion
- Attenuation
- Attenuation
Which of the following is true of network security?
world.
world.
What is called the access protection system that limits connections by calling back the number of a previously authorized location?
What is a decrease in amplitude as a signal propagates along a transmission medium best known as?
Which device acting as a translator is used to connect two networks or applications from layer 4 up to layer 7 of the ISO/OSI Model?
- Bridge
- Repeater
- Router
- Gateway
- gateway
- Transport layer
- Application layer
- Physical layer
- Network layer
- Transport layer
- Multiplexer
- Modem
- Protocol converter
- Concentrator
- Modem
- Copper cable
- Radio System
- Satellite radiolink
- Fiber optic cables
- Fiber optic cables
- SYN Flood attack
- Smurf attack
- Ping of Death attack
- Denial of Service (DOS) attack
- smurf attack
- A Smurf attack is ICMP-based and a Fraggle attack is
- A Smurf attack is UDP-based and a Fraggle attack is
- Smurf attack packets cannot be spoofed.
- A Smurf attack is UDP-based and a Fraggle attack is
- A Smurf attack is ICMP-based and a Fraggle attack is UDP-based.
In which layer of the OSI Model are connection-oriented protocols located in the TCP/IP suite of protocols?
Which of the following is a telecommunication device that translates data from digital to analog form and back to digital?
Which of the following transmission media would NOT be affected by cross talk or interference?
What is called an attack where the attacker spoofs the source IP address in an ICMP ECHO broadcast packet so it seems to have originated at the victim's system, in order to flood it with REPLY packets?
What is the main difference between a Smurf and a Fraggle attack?
UDP-based.
TCP-based.
ICMP-based.
Why are coaxial cables called "coaxial"?
- it includes two physical channels that carries the signal
- it includes one physical channel that carries the signal
- it includes two physical channels that carries the signal
- it includes one physical channel that carries the signal
- it includes one physical channel that carries the signal surrounded (after a layer
- Standard model for network communications
- Used to gain information from network devices such as
- Enables dissimilar networks to communicate
- Defines 7 protocol layers (a.k.a. protocol stack)
- Used to gain information from network devices such as count of packets
- new loop
- local loop
- loopback
- indigenous loop
- local loop
- voice
- voice and multimedia
- data and multimedia
- voice, data and multimedia
- voice and multimedia
- PPTP can run only on top of IP networks.
- PPTP is an encryption protocol and L2TP is not.
- L2TP works well with all firewalls and network devices
- L2TP supports AAA servers
- L2TP works well with all firewalls and network devices that perform NAT.
surrounded (after a layer of insulation) by another concentric physical channel, both running along the same axis.
surrounded (after a layer of insulation) by another concentric physical channel, both running along the same axis
surrounded (after a layer of insulation) by another two concentric physical channels, both running along the same axis.
surrounded (after a layer of insulation) by another concentric physical channel, both running perpendicular and along the different axis
of insulation) by another concentric physical channel, both running along the same axis The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers does NOT have which of the following characteristics?
count of packets received and routing tables
received and routing tables In telephony different types of connections are being used. The connection from the phone company's branch office to local customers is referred to as which of the following choices?
Communications and network security relates to transmission of which of the following?
One of the following statements about the differences between PPTP and L2TP is NOT true
that perform NAT.
You have been tasked to develop an effective information classification program. Which one of the following steps should be performed first?
- Establish procedures for periodically reviewing the
- Specify the security controls required for each
- Identify the data custodian who will be responsible for
- Specify the criteria that will determine how data is
- Specify the criteria that will determine how data is classified
classification and ownership
classification level
maintaining the security level of data
classified
A group of independent servers, which are managed as a single system, that provides higher availability, easier
manageability, and greater scalability is:
- server cluster
- client cluster
- guest cluster
- host cluster
- server cluster
A server cluster looks like a:
- single server from the user's point of view
- dual server from the user's point of view
- triple server from the user's point of view
- quardle server from the user's point of view
- single server from the user's point of view
If any server in the cluster crashes, processing continues transparently, however, the cluster suffers some performance degradation. This implementation is
sometimes called a:
- server farm
- client farm
- cluster farm
- host farm
- server farm
- Fiber Optic cable
- Coaxial cable
- Twisted Pair cable
- Axial cable
- fiber optic cable
- Alternative routing
- Diverse routing
- Long haul network diversity
- Last mile circuit protection
- alternative routing
Which of the following is immune to the effects of electromagnetic interference (EMI) and therefore has a much longer effective usable length?
Which of the following methods of providing telecommunications continuity involves the use of an alternative media?