Voice over Internet Protocol (VoIP) is incorrect because it is a technology that enables network managers to route phone calls and facsimile transmissions over the same network they use for data. Electronic signature is incorrect because it is an electronic sound, symbol, or process attached to or logically associated with a contract or other record and executed or adopted by a person with the intent to sign the record. Firewalls are incorrect because a firewall is software whose purpose is to block access to computing resources.
226. Which of the following are more efficient and secure for use in wireless technologies?
a.
Spread spectrumb.
Radio spectrumc.
Radio signalsd.
Radio carriers227. Which of the following is inherently efficient and difficult to intercept in the use of wireless technologies?
a.
Code division multiple access (CDMA)b.
Time division multiple access (TDMA)c.
Public-switched telephone network (PSTN)d.
Very small aperture terminal (VSAT)228. Voice encryption in cell/mobile phones uses which of the following algorithms?
a.
RSAb.
3DESc.
IDEAd.
DES229. Which of the following network connectivity devices require in-band and out-of-band management services such as administrative access to distributed local-area networks (LANs)?
a.
Firewalls and gatewaysb.
Switches and routersc.
Sensors and bridgesd.
Repeaters and modemsIn out-of-band management, the communications device is accessed via a dial-up circuit with a modem, directly connected terminal device, or LANs dedicated to managing traffic. Whether in-band or out-of-band, network paths and sessions used to access the device should be protected. The other three choices do not require in-band and out-of-band management services such as administrative access because they have their own access methods.
230. For information system monitoring, which of the following anomaly within an information system is
a.
Large file transfersb.
Unusual protocols and ports in usec.
Attempted communications with suspected external addressesd.
Long-time persistent connections231. Which of the following are especially needed to provide a trustworthy cloud computing infrastructure?
1.
ISO/IEC 27001 certification2.
AICPA/SAS 70 attestation3.
Security training