Readiness Post-AssessmentExam with Correct
Answers
1 out of 1 points
• Question 1
The world needs people who understand computer-systems and
who can protect computers and networks from criminals and terrorists.
Selected
Answer: securi
ty
Correct
Answer: securi
ty
• Question 2
1 out of 1 points
The goal and objective of a is to provide a consistent definition
for how an organization should handle and secure different types of data.
Selected
Answer:
data classification
standard
Correct
Answer: data classification
standard
• Question 3
1 out of 1 points
Today, people working in cyberspace must deal with new and constantly
evolving .
Selected
Answer: threa
ts
Correct
Answer: threa
ts
• Question 4
1 out of 1 points
The Domain connects remote users to the organization’s IT
infrastructure.
, Selected
Answer: Remote
Access
Correct
Answer: Remote
Access
• Question 5
0 out of 1 points
What term is used to describe the amount of time that an IT system,
application, or data is not available to users?
Selected
Answer: connectiv
ity
Correct
Answer: downtim
e
• Question 6
1 out of 1 points
The act of transforming cleartext data into undecipherable ciphertext is
the definition of .
Answer:
Selected
encrypti
on
Correct
Answer: encrypti
on
• Question 7
1 out of 1 points
The tunnel can be created between a remote workstation using the public
Internet and a VPN router or a secure browser and Web site.
Selected
Answer: Secure Sockets Layer virtual private network
(SSL-VPN)
Correct
Answer:
Secure Sockets Layer virtual private network
(SSL-VPN)
• Question 8
1 out of 1 points
The represents the fourth layer of defense for a typical IT
infrastructure.
, Selected
Answer:
LAN-to-WAN
Domain
Correct
Answer: LAN-to-WAN
Domain
• Question 9
1 out of 1 points
Which of the following is the definition of ciphertext?
Selected
Answer: The opposite of cleartext. Data sent as ciphertext is not
visible and not decipherable.
Correct
Answer:
The opposite of cleartext. Data sent as ciphertext is not
visible and not decipherable.
• Question 10
1 out of 1 points
Which of the following describes the Family Educational Rights and Privacy
Act (FERPA)?
Selected
Answer:
A U.S. federal law that protects the private data of students,
including their transcripts and grades, with which K–12 and
higher-education institutions must comply.
Correct
Answer: A U.S. federal law that protects the private data of students,
including their transcripts and grades, with which K–12 and
higher-education institutions must comply.
• Question 11
1 out of 1 points
As users upgrade LANs to GigE or 10GigE, switches must support
and data IP traffic.
Selected
Answer: voic
e
Correct
Answer: voic
e
• Question 12
1 out of 1 points
The total number of errors divided by the total number of bits transmitted
is the definition of .
, Selected
Answer:
bit error
rate
Correct
Answer: bit error
rate
• Question 13
0 out of 1 points
What is meant by application convergence?
Selected
Answer: A basic digital signaling rate that corresponds to one voice-
frequency-equivalent channel. Although the true data rate for
DS0 is 64 kbit/s, the effective data rate for a single voice channel
when using DS0 is 56 kbit/s.
Correct
Answer:
The integration of applications to enhance productivity. Unified
communications is an example of application convergence.
Unified communications integrates recorded voice messages into
e-mail so that voice messages are retrievable via e-mail.
• Question 14
0 out of 1 points
What name is given to a software-based application like WebEx that
supports audio conferencing and sharing of documents (text,
spreadsheets, presentations, etc.) for real-time discussions with team
members or colleagues?
Selected
Answer:
call-detail recording
(CDR)
Correct
Answer: collaboration
• Question 15
0 out of 1 points
Network devices can implement to better support VoIP and SIP
IP packets and reduce dropped calls and delays.
Selected
Answer: application
convergence
Correct
Answer:
traffic prioritization
• Question 16
0 out of 1 points