Chapter 4 ■ Communication and Network Security (Domain 4) 91
C. VoIP systems
D. Secure Process Internal Transfers
- What does a bluesnarfing attack target?
A. Data on IBM systems
B. An outbound phone call via Bluetooth
C. 8 02.11b networks
D. Data from a Bluetooth-enabled device
- Which of the following options includes standards or protocols that exist in layer 6 of the
OSI model?
A. NFS, SQL, and RPC
B. TCP, UDP, and TLS
C. JPEG, ASCII, and MIDI
D. HTTP, FTP, and SMTP - What network topology is shown here?
A. A ring
B. A bus
C. A star
D. A mesh