Level 18 Level 20
Level 19

256 - 270


15 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Ignore?
RFID
tracking via RF
Wide Area Networks (WANs)
much larger than LANs
WiMax
wireless data transmission standard
Virtual Private Networks
VPNs
digital subscriber line (DSL)
symmetric or asymmetric
circuit switched
telephone network
packet switched
technical demonstration
internetworking
interconnected LANs and WANs using routers and firewalls
routers
sophisticated routing and packet control
firewalls
control network access
two-tier client architecture
processing and data are divided between two entities
three-tier client architecture
apps and data are divided between three entities
service virtualization
remotely-hosted service
risk
Is defined as the possibility of loss of a digital asset resulting from a threat exploiting a
cyberrisk assessment
Of these attributes of risk must be analyzed to determine an organization's particular