Network monitoring tools are an example of a detective control used by network management. As such they do not show any accountability of the user. They watch the network traffic and develop trends.
Lock and key systems and card key systems are examples of preventive controls as a part of physical security. Keys can be lost or stolen, and, therefore, accountability is difficult to prove and control.
85. Attackers use which of the following to distribute their warez files?
a. File transfer protocol server
b. SOCKS server
c. Web proxy server
d. E-mail server
The socket security (SOCKS) server is a networking-proxy protocol that enables full access across the SOCKS server from one host to another without requiring direct IP reachability. Web proxy servers are used to access external websites. E-mail servers can be used to do proper things such as sending normal messages and sending malicious code.
86. Which of the following networks provides for movement of employees within an organization without the associated cabling costs?
a. Traditional local-area networks (LANs)
b. Metropolitan-area networks (MANs)
c. Virtual local-area networks (VLANs)
d. Value-added networks (VANs)
Traditional (wired) LANs are incorrect because they require a change of cabling when users and their equipment move around. Network maintenance costs are higher and moves are slower. MANs and VANs are incorrect because they do not employ cables as traditional LANs do.
87. Frame relay and X.25 networks are part of which of the following?
a. Circuit-switched services
b. Cell-switched services
c. Packet-switched services
d. Dedicated digital services
Circuit-switched services are incorrect because they are better suited for delay-sensitive traffic. They establish a virtual connection before transmitting data. They do not use X.25 and frame relay protocols.
Cell-switched services are incorrect because they use a fixed-size cell rather than a variable-size packet (e.g., asynchronous transfer mode networks). This type of switching is faster and less expensive. They do not use X.25 and frame relay protocols either.
Dedicated digital services are incorrect because they handle voice, video, and data. The dedicated lines are usually leased and installed between two points to provide dedicated, full-time service. T1 and T3 are examples of dedicated digital lines.
88. Which of the following statements is
a. Are platform-dependent.
b. Are platform-independent.
c. Use layered communication protocols.
d. Are easy to set up.