A 100% VERIFIED
A ________ examines the network layer address and routes packets based on routing protocol path
determination decisions. - ANS>>> Layer 3 switch
Today, people working in cyberspace must deal with new and constantlyevolving ________. - ANS>>>
threats
The world needs people who understand computer-systems ________ and who can protect computers
and networksfrom criminals and terrorists. - ANS>>> security
A ___________ gives priorities to the functions an organization needs to keep going. - ANS>>> business
continuity plan (BCP)
____________ is the amount of time it takes to recover and make a system, application, and data
available for use after an outage. - ANS>>> Recovery time objective (RTO)
____________ is the practice of hiding data and keeping it away from unauthorized users. - ANS>>>
Cryptography
A ___________ defines how a business gets back on its feet after a major disaster like a fire or hurricane.
- ANS>>> disaster recovery plan (DRP)
What is meant by call control? - ANS>>> The software in a phone system that performs the call
switching from an inboundtrunk to a phone extension.
________ is the basis for unified communications and is the protocol used by real-timeapplications such
as IM chat, conferencing, and collaboration. - ANS>>> Session Initiation Protocal (SIP)
A common DSL service is ________,where the bandwidth is different for downstream and upstream
traffic. - ANS>>> asymmetric digital subscriber line (ADSL)
The ________ in analog communications is one error for every 1,000 bits sent; in digital communications,
the __________ is one error for every 1,000,000 bits sent. - ANS>>> bit error rate