1.
An installed Ethernet cable run in an unshielded twisted pair (UTP) network is more than 100 meters long. Which of the following could be caused by the length of the cable?
2.
Which of the following line media would provide the BEST security for a telecommunication network?
3.
Which of the following types of firewalls would BEST protect a network from an internet attack?
4.
Neural networks are effective in detecting fraud because they can:
5.
Assuming this diagram represents an internal facility and the organization is implementing a firewall protection program, where should firewalls be installed?
6.
For locations 3a, 1d and 3d, the diagram indicates hubs with lines that appear to be open and active. Assuming that is true, what control, if any, should be recommended to mitigate this weakness?
7.
An organization provides information to its supply chain partners and customers through an extranet infrastructure. Which of the following should be the GREATEST concern to an IS auditor reviewing the firewall security architecture?
8.
In a client-server architecture, a domain name service (DNS) is MOST important because it provides the:
9.
In what way is a common gateway interface (CGI) MOST often used on a webserver?
10.
Receiving an EDI transaction and passing it through the communication's interface stage usually requires: