Which of the following transmission error can be caused by the length of cable if UTP is more than 100 meters long?
Select one
A.
B.
C.
D.
Answer and explanation:
Attenuation is the weakening of signals during transmission. Attenuation exists in both wired and wireless transmissions. Length of wire impacts the severity of attenuation. Electromagnetic interference (EMI) is caused by outside disturbance which is not the case here. Sags spikes & surges and cross-talk has nothing to do with the length of the UTP cable.
Question 2 - ID: 5012514
An IS auditor is reviewing the physical security, control a data center and notices several areas for concern. Which of the following areas is the MOST important?
Select one
A.
B.
C.
D.
Answer and explanation:
A
The emergency power off button issue is a significant concern, but life safety is the highest priority.
B
Life safety is always the highest priority; therefore, the blocking of the emergency exit is the most serious problem
C
The primary purpose of the fire suppression system is to protect the equipment and building. The lack of scheduled maintenance is a concern; however, this does not indicate that the system would not function as required, The more critical issue is the emergency exit because life safety is the highest priority.
D
The lack of security cameras inside the data center may be a significant concern; however, the more significant issue is the emergency exit door being blocked.
Question 3 - ID: 6112886
Which of the following transmission error can occur in wired as well as wireless communication?
Select one
A.
B.
C.
D.
Answer and explanation:
Attenuation is the weakening of signals during transmission. Attenuation can occur in both wired and wireless transmissions. Crosstalk can refer to electromagnetic interference from one unshielded twisted pair to another twisted pair, normally running in parallel. Cross-talk occurs only in wired communication. Multipath interference results in a direct signal coming with one or more reflected radio (wireless) signals.
Question 4 - ID: 4512622
An IS auditor is reviewing the physical security measures of an organization. Regarding the access card system, the IS auditor should be MOST concerned that:
Select one
A.
B.
C.
D.
Answer and explanation:
A
Physical security is meant to control who is entering a secured area, so identification of all individuals is of utmost importance. It is not adequate to trust unknown external people by allowing them to write down their alleged name without proof (e.g., identity card, driver's license).
B
Separating card issuance from technical rights management is a method to ensure the proper segregation of duties so that no single person can produce a functioning card for a restricted area within the organization's premises. The long lead time is an inconvenience but not a serious audit risk.
C
Having the name and address of the organization on the card may be a concern because a malicious finder could use a lost or stolen card to enter the organization's premises.
D
System failure of the card programming device would normally not mean that the readers do not function anymore. It simply means that no new cards can be issued, so this option is minor compared to the threat of improper identification.
Question 5 - ID: 7912888
To minimize the risk of data corruption, which of the following options can be effective?
Select one
A.
B.
C.
D.
Answer and explanation:
Using separate conduits for data cables and electrical cables, minimizes the risk of data corruption due to an induced magnetic field created by electrical current. Other options will not prevent data from being corrupted. Data encryption minimizes the risk of data leakage & hashing ensures data integrity however they cannot prevent corruption. A check-digit will help detect the data corruption during communication, but will not prevent it.
Question 6 - ID: 8912889
Which transmission method would provide best security?
Select one
A.
B.
C.
D.
Answer and explanation:
In computer networks and telecommunications, a dedicated line is a communications cable or other facility dedicated to a specific application, in contrast with a shared resource such as the telephone network or the Internet. Dedicated lines are most secured amongst the above options. Since there are no sharing of lines, data security can be assured.
Question 7 - ID: 3112526
What is a risk associated with attempting to control physical access to sensitive areas such as computer rooms using card keys or locks?
Select one
A.
B.
C.
D.
Answer and explanation:
A
Piggybacking or tailgating can compromise the physical access controls.
B
The testing of controlled access would be of minimal concern in a disaster recovery environment.
C
Duplicating access control cards or keys is technically challenging.
D
An access control system should have easily followed procedures for managing user access throughout the access life cycle.
Question 8 - ID: 9112423
An IS auditor is assessing a biometric system used to protect physical access to a data center containing regulated data. Which of the following observations is the GREATEST concern to the auditor?
Select one
A.
B.
C.
D.
Answer and explanation:
A
Biometric scanners are best located in restricted areas to prevent tampering, but video surveillance is an acceptable mitigating control. The greatest concern is lack of a securely encrypted tunnel between the scanners and the access control system.
B
Data transmitted between the biometric scanners and the access control system should use a securely encrypted tunnel to protect the confidentiality of the biometric data.
C
Generally, virtual private network software provides a secure tunnel so that remote administration functions can be performed. This is not a concern.
D
The biometric risk analysis should be performed periodically, but an analysis performed three years ago is not necessarily a cause for concern.
Question 9 - ID: 9012885
An organization is considering type of transmission media which provide best security against unauthorized access. Which of the following provides best security?
Select one
A.
B.
C.
D.
Answer and explanation:
In fiber-optic cables, glass fibers are used to carry binary signals as flashes of light- Fiber-optic cables have proven to be more secure than the other media. They have very low transmission loss, not affected by EMI and preferred choice for high volumes and long distance calls.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you accept and understand our Privacy Policy.