Q20. Companies implement __________ systems to retain and archive their business
ID: 3890969 • Letter: Q
Question
Q20. Companies implement __________ systems to retain and archive their business records that are not needed for current operations or decisions, but that must be accessible for legal or auditing obligations.
a. electronic records management
b. database management
c. archive management
d. infrastructure management
Q21. What is significant about 4G networks is that they do not have a __________, which both 2G and 3G networks do have.
a. packet-switched IP system
b. circuit-switched subsystem
c. WiMAX standard
d. GSM-based LTE subsystem
Q22. Virtual private networks (VPN) are private tunnels in the Internet that are created by __________.
a. content indexing
b. usernames and passwords
c. biometrics
d. encryption
Q23. __________ is a general term that means fast transmission speed.
a. Bandwidth
b. Protocol
c. TCP/IP
d. Broadband
Q24. __________ transmits voice and data in packets and has become one of the most cost effective ways to communicate.
a. TCP
b. UDP
c. VoIP
d. UM
Q25. Which of the following is a dysfunction of the group process?
a. Social pressures of conformity can lead to groupthink.
b. A group may produce synergy during problem solving.
c. Group members may have their egos embedded in the decision, and so they may be committed to the solution.
d. Groups are better than individuals at understanding problems.
Q26. __________ are networks that are capable of transmitting data at very fast rates, but operate in a limited area, such as an office building, campus, or home.
a. MANs
b. Hot spots
c. LANs
d. WANs
Q27. What is the most cost-effective approach to managing fraud?
a. prevention
b. detection
c. prosecution
d. compliance
Q28. __________, such as AirSnort and WEPcrack, are readily available tools that can be used to gain unauthorized access to networks putting them at great risk.
a. Wireless packet analyzers
b. Password crackers
c. Firewall sniffers
d. Intrusion detectors
Q29. A(n) __________ is the probability of a threat exploiting a vulnerability.
a. threat
b. risk
c. vulnerability
d. exploit
Q30. Crime can be divided into two categories depending on the tactics used to carry out the crime. What are those two categories?
a. personal and non-personal
b. felonies and misdemeanors
c. insider and outsider
d. violent and nonviolent
Explanation / Answer
Q20. Companies implement __________ systems to retain and archive their business records that are not needed for current operations or decisions, but that must be accessible for legal or auditing obligations.
a. electronic records management
Q22. Virtual private networks (VPN) are private tunnels in the Internet that are created by __________.
d. encryption
Q23. Broadband is a general term that means fast transmission speed.
Q24. VOIP transmits voice and data in packets and has become one of the most cost effective ways to communicate.
q26 . LAN are networks that are capable of transmitting data at very fast rates, but operate in a limited area, such as an office building, campus, or home.
Q27. What is the most cost-effective approach to managing fraud?
d. compliance
Q28. __________, such as AirSnort and WEPcrack, are readily available tools that can be used to gain unauthorized access to networks putting them at great risk.
b. Password crackers
Q29. A(n) Risk is the probability of a threat exploiting a vulnerability.
Q30. Crime can be divided into two categories depending on the tactics used to carry out the crime. What are those two categories?
d. violent and nonviolent
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.