Which of the following devices extends the network and has
the capacity to store frames and act as a storage and
forward device?
A. Router
B. Bridge
C. Repeater
D. Gateway
Answer / guest
Answer: B
A bridge connects two separate networks to form a logical
network (e.g., joining an ethernet and token network) and
has the storage capacity to store frames and act as a
storage and forward device. Bridges operate at the OSI data
link layer by examining the media access control header of a
data packet. Routers are switching devices that operate at
the OSI network layer by examining network addresses (i.e.,
routing information encoded in an IP packet). The router, by
examining the IP address, can make intelligent decisions in
directing the packet to its destination. Repeaters amplify
transmission signals to reach remote devices by taking a
signal from a LAN, reconditioning and retiming it, and
sending it to another. This functionality is hardware
encoded and occurs at the OSI physical layer. Gateways
provide access paths to foreign networks.
Is This Answer Correct ? | 10 Yes | 0 No |
Which of the following data entry controls provides the GREATEST assurance that the data is entered correctly? A. Using key verification B. Segregating the data entry function from data entry verification C. Maintaining a log/record detailing the time, date, employee's initials/user id and progress of various data preparation and verification tasks D. Adding check digits
The most common problem in the operation of an intrusion detection system (IDS) is: A. the detection of false positives. B. receiving trap messages. C. reject error rates. D. denial-of-service attacks.
Which of the following is a feature of an intrusion detection system (IDS)? A. Gathering evidence on attack attempts B. Identifying weakness in the policy definition C. Blocking access to particular sites on the Internet D. Preventing certain users from accessing specific servers
In a TCP/IP-based network, an IP address specifies a: A. network connection. B. router/gateway. C. computer in the network. D. device on the network.
Before reporting results of an audit to senior management, an IS auditor should: A. Confirm the findings with auditees. B. Prepare an executive summary and send it to auditee management. C. Define recommendations and present the findings to the audit committee. D. Obtain agreement from the auditee on findings and actions to be taken.
Which of the following would an IS auditor consider to be the MOST important when evaluating an organization's IS strategy? That it: A. has been approved by line management. B. does not vary from the IS department's preliminary budget. C. complies with procurement procedures. D. supports the business objectives of the organization.
1. which of the following is used to achieve accountability. a.identification b. authentication c. authorization d. iniation
Separation of duties between computer opeartors and other data processing personnel is intended to: A. Prevent unauthorized modifications to program or data. B. Reduce overall cost of operations C. Allow operators to concentrate on their assigned duties D. Restrict operator access to data
LANs: A. protect against virus infection. B. protect against improper disclosure of data. C. provide program integrity from unauthorized changes. D. provide central storage for a group of users.
A B-to-C e-commerce web site as part of its information security program wants to monitor, detect and prevent hacking activities and alert the system administrator when suspicious activities occur. Which of the following infrastructure components could be used for this purpose? A. Intrusion detection systems B. Firewalls C. Routers D. Asymmetric encryption
Which of the following would be the LEAST important aspect of a business continuity plan? A. Redundant facilities B. Relocation procedures C. Adequate insurance coverage D. Current and available business continuity manual
Disaster recovery planning addresses the: A. technological aspect of business continuity planning. B. operational piece of business continuity planning. C. functional aspect of business continuity planning. D. overall coordination of business continuity planning.