Voice over Internet Protocol (VoIP) is incorrect because it is a technology that enables network managers to route phone calls and facsimile transmissions over the same network they use for data. Electronic signature is incorrect because it is an electronic sound, symbol, or process attached to or logically associated with a contract or other record and executed or adopted by a person with the intent to sign the record. Firewalls are incorrect because a firewall is software whose purpose is to block access to computing resources.
226. Which of the following are more efficient and secure for use in wireless technologies?
a. Spread spectrum
b. Radio spectrum
c. Radio signals
d. Radio carriers
227. Which of the following is inherently efficient and difficult to intercept in the use of wireless technologies?
a. Code division multiple access (CDMA)
b. Time division multiple access (TDMA)
c. Public-switched telephone network (PSTN)
d. Very small aperture terminal (VSAT)
228. Voice encryption in cell/mobile phones uses which of the following algorithms?
a. RSA
b. 3DES
c. IDEA
d. DES
229. Which of the following network connectivity devices require in-band and out-of-band management services such as administrative access to distributed local-area networks (LANs)?
a. Firewalls and gateways
b. Switches and routers
c. Sensors and bridges
d. Repeaters and modems
In out-of-band management, the communications device is accessed via a dial-up circuit with a modem, directly connected terminal device, or LANs dedicated to managing traffic. Whether in-band or out-of-band, network paths and sessions used to access the device should be protected. The other three choices do not require in-band and out-of-band management services such as administrative access because they have their own access methods.
230. For information system monitoring, which of the following anomaly within an information system is
a. Large file transfers
b. Unusual protocols and ports in use
c. Attempted communications with suspected external addresses
d. Long-time persistent connections
231. Which of the following are especially needed to provide a trustworthy cloud computing infrastructure?
1. ISO/IEC 27001 certification
2. AICPA/SAS 70 attestation
3. Security training