The key difference between a microwave radio system and a
satellite radiolink system is that:
A. microwave uses line-of-sight and satellite uses
transponders during transmission.
B. microwave operates through transponders placed on the
earth's orbit.
C. satellite uses line-of-sight during transmission.
D. microwave uses fiber optic cables.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A
The key difference between a microwave radio system and
satellite radiolink system is that microwave transmits along
the line-of-sight, while a satellite radiolink system
operates through transponders placed on the earth's orbit
and a microwave radio system operates on land along the line
of sight. Both microwave and satellite use electromagnetic
radiation and not fiber optic cables for their communication.
| Is This Answer Correct ? | 30 Yes | 3 No |
Answer / gndu student
microwave is used for cooking like pizza, murga etc..:P
n satellite is used for calling your girlfriend..<3
another use of satellite is we can watch world cup in TV :p
| Is This Answer Correct ? | 7 Yes | 7 No |
Answer / pir yaqoob shah
microwave is use for cooking.
and communication satellite is use for calling with girl friend.
| Is This Answer Correct ? | 4 Yes | 13 No |
An organization is considering connecting a critical PC-based system to the Internet. Which of the following would provide the BEST protection against hacking? A. An application-level gateway B. A remote access server C. A proxy server D. Port scanning
An IS auditor, performing a review of an application?s controls, discovers a weakness in system software, which could materially impact the application. The IS auditor should: A. Disregard these control weaknesses as a system software review is beyond the scope of this review. B. Conduct a detailed system software review and report the control weaknesses. C. Include in the report a statement that the audit was limited to a review of the application?s controls. D. Review the system software controls as relevant and recommend a detailed system software review.
Many IT projects experience problems because the development time and/or resource requirements are underestimated. Which of the following techniques would provide the GREATEST assistance in developing an estimate of project duration? A. Function point analysis B. PERT chart C. Rapid application development D. Object-oriented system development
An IS auditor performing a telecommunication access control review should be concerned PRIMARILY with the: A. maintenance of access logs of usage of various system resources. B. authorization and authentication of the user prior to granting access to system resources. C. adequate protection of stored data on servers by encryption or other means. D. accountability system and the ability to identify any terminal accessing system resources.
What data should be used for regression testing? A. Different data than used in the previous test B. The most current production data C. The data used in previous tests D. Data produced by a test data generator
An IS auditor doing penetration testing during an audit of Internet connections would: A. evaluate configurations. B. examine security settings. C. ensure virus-scanning software is in use. D. use tools and techniques that are available to a hacker.
Which of the following is a role of an IS steering committee? A. Initiate computer applications. B. Ensure efficient use of data processing resources. C. Prepare and monitor system implementation plans. D. Review the performance of the systems department.
Which of the following is an example of a passive attack, initiated through the Internet? A. Traffic analysis B. Masquerading C. Denial of service D. E-mail spoofing
Which of the following is the MOST critical element of an effective disaster recovery plan (DRP)? A. Offsite storage of backup data B. Up-to-date list of key disaster recovery contacts C. Availability of a replacement data center D. Clearly defined recovery time objective (RTO)
An Internet-based attack using password sniffing can: A. enable one party to act as if they are another party. B. cause modification to the contents of certain transactions. C. be used to gain access to systems containing proprietary information. D. result in major problems with billing systems and transaction processing agreements.
Which of the following programs would a sound information security policy MOST likely include to handle suspected intrusions? A. Response B. Correction C. Detection D. Monitoring
Antivirus software should be used as a: A. detective control. B. preventive control. C. corrective control. D. compensating control.