a.
The time between the flaw identification and the flaw remediation processb.
The time between the vulnerability identification and the vulnerability remediation processc.
The time between the vulnerability identification and the vulnerability exploitationd.
The time between the weaknesses is discovered and the time to eliminate the weaknesses72. The basic protocols would
a.
Message size, sequence, and formatb.
Message routing instructionsc.
Error detection and correctiond.
Message authentication73. The
a.
Network contingency plansb.
Network capacity planningc.
Network application systemd.
Network performance monitoringThe other three choices are important to minimize losses from a network failure. Network contingency plans deal with redundant switching equipment, parallel physical circuits, and standby power supplies to address network disasters. Network capacity plans assist in forecasting computer resource requirements to ensure that adequate capacity exists when needed. For example, the capacity studies may call for higher bandwidth to accommodate newer technologies such as multimedia and videoconferencing. Capacity planning activities use current system performance data as a starting point to predict future resource needs. Network performance monitoring involves analyzing the performance of a computer system to determine how resources are currently utilized and how such utilization can be improved.
74. Conducting a periodic network monitoring to verify proper operations does
a.
Detecting network layersb.
Detecting line errorsc.
Detecting terminal errorsd.
Detecting modem errors75. Which of the following actions is
a.
Block inbound and outbound traffic between instant messaging clients configured by end users.b.
Block inbound and outbound traffic between instant messaging clients configured by external providers.c.
Disconnect all unneeded collaborative computing devices physically.d.
Block inbound and outbound traffic between instant messaging clients configured by the IT security.76. For worldwide interoperability for microwave access (WiMAX) security, when an adversary drains a client node’s battery by sending a constant series of management messages to the subscriber station/mobile subscriber (SS/MS), what is it called?
a.
Man-in-the-middle attackb.
Water torture attackc.
Radio frequency jamming attack