Most network installations use a(n) ________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
A. MIS
B. Ethernet
C. Wi-Fi
D. DSS
Answer: B
You might also like to view...
What practice requires an organization to identify potential attackers and then use knowledge management techniques to document the risks of greatest concern?
A. Security features and design B. Attack models C. Compliance and policy D. Architecture analysis
Which of the following best describes the purpose of security awareness?
A. To teach skills that would allow a person to perform a certain function B. To focus attention on security C. To integrate all the security skills and competencies into a common body of knowledge D. To involve management in the process
What material is recommended for secure storage containers and cabinets?
a. Gypsum b. Steel c. Wood d. Expanded metal
All ____ arrays are created and destroyed each time the function they are local to is called and completes its execution.
A. global B. static C. auto D. extern