Showing posts with label Data Communication & Networking. Show all posts
Showing posts with label Data Communication & Networking. Show all posts

Threat of intrusion comes from ____________.

Threat of intrusion comes from ____________.




a. the government
b. crackers
c. outside of the organization
d. both inside and outside of the organization
e. inside of the organization



Answer: D

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: 




a. decreased because the new sophisticated technology is far more secure than the old manual methods
b. remained the same because management was always deeply interest in control and security
c. decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society
d. increased because this commitment to data communications has changed the potential vulnerability of the organization's assets
e. remained the same because there are very few threats to data communications



Answer: D

Internet 2 is also known as:

Internet 2 is also known as:




a. CA*Net3
b. IETF
c. Next Generation Internet
d. the Abilene network
e. passive optical networking



Answer: D