a. The time between the flaw identification and the flaw remediation process
b. The time between the vulnerability identification and the vulnerability remediation process
c. The time between the vulnerability identification and the vulnerability exploitation
d. The time between the weaknesses is discovered and the time to eliminate the weaknesses
72. The basic protocols would
a. Message size, sequence, and format
b. Message routing instructions
c. Error detection and correction
d. Message authentication
73. The
a. Network contingency plans
b. Network capacity planning
c. Network application system
d. Network performance monitoring
The other three choices are important to minimize losses from a network failure. Network contingency plans deal with redundant switching equipment, parallel physical circuits, and standby power supplies to address network disasters. Network capacity plans assist in forecasting computer resource requirements to ensure that adequate capacity exists when needed. For example, the capacity studies may call for higher bandwidth to accommodate newer technologies such as multimedia and videoconferencing. Capacity planning activities use current system performance data as a starting point to predict future resource needs. Network performance monitoring involves analyzing the performance of a computer system to determine how resources are currently utilized and how such utilization can be improved.
74. Conducting a periodic network monitoring to verify proper operations does
a. Detecting network layers
b. Detecting line errors
c. Detecting terminal errors
d. Detecting modem errors
75. Which of the following actions is
a. Block inbound and outbound traffic between instant messaging clients configured by end users.
b. Block inbound and outbound traffic between instant messaging clients configured by external providers.
c. Disconnect all unneeded collaborative computing devices physically.
d. Block inbound and outbound traffic between instant messaging clients configured by the IT security.
76. For worldwide interoperability for microwave access (WiMAX) security, when an adversary drains a client node’s battery by sending a constant series of management messages to the subscriber station/mobile subscriber (SS/MS), what is it called?
a. Man-in-the-middle attack
b. Water torture attack
c. Radio frequency jamming attack