Level 18
Level 20
15 words 0 ignored
Ready to learn
Ready to review
Ignore words
Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.
Ignore?
RFID
tracking via RF
Wide Area Networks (WANs)
much larger than LANs
WiMax
wireless data transmission standard
Virtual Private Networks
VPNs
digital subscriber line (DSL)
symmetric or asymmetric
circuit switched
telephone network
packet switched
technical demonstration
internetworking
interconnected LANs and WANs using routers and firewalls
routers
sophisticated routing and packet control
firewalls
control network access
two-tier client architecture
processing and data are divided between two entities
three-tier client architecture
apps and data are divided between three entities
service virtualization
remotely-hosted service
risk
Is defined as the possibility of loss of a digital asset resulting from a threat exploiting a
cyberrisk assessment
Of these attributes of risk must be analyzed to determine an organization's particular