ExamGecko
Home Home / ASIS / PSP

ASIS PSP Practice Test - Questions Answers, Page 10

Question list
Search
Search

LANs and WANs can communicate with each other using a communications rule called:

A.
Ethernet Protocol packet
A.
Ethernet Protocol packet
Answers
B.
Protocol Assembly packet
B.
Protocol Assembly packet
Answers
C.
XOP.210 Protocol packet
C.
XOP.210 Protocol packet
Answers
D.
Internet Protocol packet
D.
Internet Protocol packet
Answers
Suggested answer: D

IP sends information across networks in packets, each containing between 1 and approximately:

A.
1,000 characters
A.
1,000 characters
Answers
B.
12, 00 characters
B.
12, 00 characters
Answers
C.
15, 00 characters
C.
15, 00 characters
Answers
D.
18, 00 characters
D.
18, 00 characters
Answers
Suggested answer: C

Which protocol divides the information into packets, sequentially numbers each packet, and inserts some error control information?

A.
Transmission Control protocol
A.
Transmission Control protocol
Answers
B.
File Transfer protocol
B.
File Transfer protocol
Answers
C.
Information Control protocol
C.
Information Control protocol
Answers
D.
None of the above
D.
None of the above
Answers
Suggested answer: A

A study of BDP international has found that ___________ of shippers are factoring in additional time to comply with the Advanced Manifest System, which went into effect in February 2003. This Department of Homeland security rule requires the filing of complete import manifest documentation at least 24 hours before U.S.-bound ships are loaded at foreign ports.

A.
30 percent
A.
30 percent
Answers
B.
25 perc
B.
25 perc
Answers
C.
35 percent
C.
35 percent
Answers
D.
40 percent
D.
40 percent
Answers
Suggested answer: A

To deal with the lack of security, both government organizations have developed guidelines for protecting electric facilities and distribution systems. On the private side, the Edison Electric Institute developed guidelines that have been passed on to the North American Electric Reliability Council (NERC), the U.S. Department of Energy's coordinator for the U.S. electrical infrastructure. Among other things the guide lines cover:

A.
Vulnerability/risk analysis
A.
Vulnerability/risk analysis
Answers
B.
Threat response
B.
Threat response
Answers
C.
Cyber scenario
C.
Cyber scenario
Answers
D.
Emergency detection
D.
Emergency detection
Answers
Suggested answer: A, B

What allows people to log on to a remote computer and use the resources of that system if they have a valid account?

A.
Cabinet
A.
Cabinet
Answers
B.
Telnet
B.
Telnet
Answers
C.
Telecom
C.
Telecom
Answers
D.
None of the above
D.
None of the above
Answers
Suggested answer: B

A system of discussion groups in which individual articles are distributed throughout the world is called:

A.
Usenet
A.
Usenet
Answers
B.
Telnet
B.
Telnet
Answers
C.
Widespread net
C.
Widespread net
Answers
D.
Web net
D.
Web net
Answers
Suggested answer: A

A series of menus from which a person can access virtually any type of textual information is known as:

A.
Consortium
A.
Consortium
Answers
B.
Hyper-text based tool
B.
Hyper-text based tool
Answers
C.
Symantec
C.
Symantec
Answers
D.
Gophers
D.
Gophers
Answers
Suggested answer: D

Trimming off small amounts of money from many sources and diverting these slices into one's own or an accomplice's account is known as:

A.
Manipulation technique
A.
Manipulation technique
Answers
B.
Auction planning
B.
Auction planning
Answers
C.
Salami Technique
C.
Salami Technique
Answers
D.
Hostile applets
D.
Hostile applets
Answers
Suggested answer: C

A set of unwanted instructions executed on a computer and resulting in a variety of effects is called:

A.
Virus
A.
Virus
Answers
B.
Worm
B.
Worm
Answers
C.
Bug
C.
Bug
Answers
D.
All of the above
D.
All of the above
Answers
Suggested answer: A
Total 182 questions
Go to page: of 19