• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

WEP provides strong protection for confidentiality.

False

Bluejacking is when an attacker uses Bluetooth to copy the victim's information such as e-mails, contact lists, calendars, photos, and videos.


False

With any wireless protocol, which of the following are true?

Extra care should be taken to ensure that the security of the protocol is not compromised

What is WAP?

It is a protocol used by older cellular phones to deliver e-mail and lightweight web services.


802.11 is the IEEE standard for wireless local area networks and includes the following:

a, b, g, n

Which of the following protocols was designed for short-range wireless communications, such as accessories for mobile phones?

Bluetooth

WAP was designed to work on which of the following?

Devices with low computing power

WAP uses ______ as its security protocol.

WTLS

WAP implements integrity through the use of


MACs

The cryptographic standard for 3G networks is

KASUMI

RAID 5 implements exact copies of disks, with all the data mirrored on another drive

False

Categorizing business functions is useful in determining which functions will be restored first in the event of a disaster.

True

In which backup strategy are only those portions of the files and software that have changed since the last backup backed up?

Delta

Which of the following is a consideration in calculating the cost of a backup strategy?

A) The cost of the backup media
B) The storage costs for the backup media
C) The frequency with which backups are created

How is high availability generally achieved?

Redundant Systems

What is the primary purpose of a business impact analysis?

To identify and describe the most important functions for an organization


If an organization can last without a business function for up to 30 days before it is severely impacted, that function would be categorized as which of the following?

Necessary for normal processing

In which incident response phase might it be necessary to implement the BCP?

Recovery phase

If the loss of a business function would severely impact an organization, that function would be categorized as which of the following?

Critical

Which type of RAID does not provide redundancy to improve reliability?

RAID 0