IS3445 CHAP 14 SECURING PERSONAL AND BUSINESS COMMUNICATIONS Flashcards

1
Q

____ is how mobil phones handle Web and multimedia content intended for more powerful systems with larger screens.

A

Content adaptation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ is a delay. It can apply to the sending, processing, transmission, storage, or receiving of information.

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ is a specification from the Open Mobile Alliance. The specification details implementation requirements for any organization interested in providing MMS.

A

Multimedia Messaging Service Encapsulation Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ is presence information aggregated from several devices to a single presence status. The reported status is provided to other users.

A

(MPOP) Multiple Points of Presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ is the ability and willingness of an end user to engage in communication.
The inför is controlled by the end user and gives real-time confidence that the user is accessible.

A

Presence and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is the protocol used for streaming audio or video in packets over an IP network.

A

(RTP) Real-time Transport Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ is a network endpoint that is enabled to function as either a SIP user agent client, or a user agent server.

A

SIP user agent (UA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SIP user ____ makes requests and receives responses.

A

SIP user agent client (UAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SIP user ____ acts as a proxy between two SIP user agent clients for the purpose of facilitating a SIP session. This acts as both client and server to receive and forward session control requests and responses.

A

SIP user agent server (UAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ is the technique of relaying communications between two or more users by intermediate storage.
Delivery from sender to a central storage is immediate, but the final transmission to the recipient depends on availability and a request for the stored info.

A

Store-and-forward communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. When information is temporarily kept at one or more middle points during transmission, that technique is called ___ communication.
A

Store-and-Forward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which of the following describes Multiple Points of Presence (MPOP)?
  2. Aggregating multiple email accounts to your current logged on account
  3. Aggregating presence information from multiple applications or devices
  4. Dividing voice mail to lessen the risk of eavesdropping
  5. Dividing MMS messages to separate text and graphics or video pieces
A

Aggregating presence information from multiple applications or devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Phishing, social engineering, and 419 scams are some of the threats encountered when using ___.
A

Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Social networking site messages or chats can be considered very private and secure.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Why are PBXs an attractive target to attackers?
  2. Several services depend on the PBXs operation
  3. Numerous protocols are involved
  4. The device is usually left out in the open
  5. All the above
  6. 1 & 2 only
A

Several services depend on the PBXs operation

Numerous protocols are involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Store-and-forward communication is preferred over real-time communication in which environments? (Select two)
  2. When delivery is unreliable
  3. When the destination is not always available
  4. When source and destination are not in the same country
  5. When low latency is critical
A

When delivery is unreliable

When the destination is not always available

17
Q
  1. Which of the following are primary threats internet in fax machines? (Select two)
  2. Fax machines are too heavy for safe lifting by one person
  3. Hard drives storing faxes are not wiped prior to disposal
  4. Fax paper is lighter wight, posing a larger risk of paper cuts
  5. Poor physical security leaves confidential faxes unprotected
A

Hard drives storing faxes are not wiped prior to disposal

Poor physical security leaves confidential faxes unprotected

18
Q
  1. Which areas of concern are associated with SMS vulnerabilities?(Select two)
  2. Availability
  3. Integrity
  4. Confidentiality
  5. All the above
A

Integrity

Confidentiality

19
Q
  1. SMS and MMS are primarily the same service apart from the addition of multimedia with MMS.
    TRUE OR FALSE
A

FALSE

20
Q
  1. Protocols such as SIP.H323.MGCP.IP. and RTP are encountered when discussing which of the following?
  2. Email
  3. Voice mail
  4. VoIP
  5. Fax
  6. SMS
A

Fax

21
Q
  1. This chapter discussed which issues brought on by adding VoIP devices to an organization? (Select two)
  2. Performance issues: significantly more network traffic
  3. Security issues: new attack vectors and more vulnerabilities to deal with
  4. User-related issues:users require additional training and might be less productive
  5. Facility issues: finding the space to put the phones
A

Performance issues: significantly more network traffic

Security issues: new attack vectors and more vulnerabilities to deal with

22
Q
  1. A networking method of segregating VoIP traffic from data traffic is ___.
A

Virtual local area networks or VLANs

23
Q
  1. Select one way the SIP protocol does not assist with establishing a multimedia connection.
  2. User availability
  3. User location
  4. User capabilities
  5. User distance
A

User distance

24
Q
  1. The SIP protocol manages multimedia sessions with features similar to how the telephone system dials, rings, and manages responses from phones.
    TRUE OR FALSE
A

TRUE

25
Q
  1. The SIP session request and response messages are formed similarly to ___ messages.
  2. DHCP
  3. DNS
  4. HTTP
  5. SNMP
A

HTTP