• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/68

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

68 Cards in this Set

  • Front
  • Back

IMEI

International mobile equipment identifier

VPN



Virtual Private Network

Faraday cage

Blocks radio signals



NAT

Network address translator ensures IP addresses of users accessing the internet from the internalnetwork appeaer as a public IP address

service account

which type of mobile device account is typically configured with a non expiring password

SCEP

Simple certificate enrollment protocol that can be used to securely complete the device enrollment process with mobile device management infrastucture using a secure portal

WEP

Wired equivalent privacy is a wireless security protocol that uses 64 bit static keys on wireless security

802 11a and 802 11n

wireless standards can use the 5 ghz frequency band

Configure NAC device to enforce a corporate data back up upon connection to the corporate infrastructure and implement backup policy that is pushed to all corporate mobile devices.

used as a best practice to back up corporate data stored on a corporate mobile device to a corporate server

NAC

Network access control

device grouping and administrative permissions

designing and MDM infrastructure which security requirements should be configured for ease of users and device management

device grouping

putting users into groups for security purposes to assign a policy to a group



upgrading to a new osi and email client doesnt work and third party osi company doesnt want to fix it

get a new email client

gateway

what device do you need to connect networks that use different protocols

push action and internal self service enrollment website

used within an mdm infrastructure as part of the certificate life cycle to renew an expired device certificate

WSUS

Windows server update services


used to update windows and other microsoft updates

secure replacement for telnet

VPN

virtual private network

SSH

secure socket shell

native

application development method that provides the fastest performances and best user experience.

javascript

computer programming language that is classified as prototype base scripting language


can be used for android apps

DDoS attack

DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.

suspected ddos attack after external website was unavailable for users

consult the indecent response plan

device does not maintain a constant connection to the cable when being charged. you tried to use different charger and a different cable swapped out battery with a known working one if it doesnt work what do you do

escalate the issue

wireless risks that would be more likely to affect a wireless network that uses WEP

Weak keys and main in the middle

man in the middle

person intercepts data between where it was sent and where it is going


attacker eaves drops on communication with out permission

weak keys

wireless networks that are secured with weak encryption keys


short passwords

managed as part of the end of life cycle for mobile platforms within an mdmi

applications, devices, and operating systems

two bluetooth devices together for the purpose of transferring data from one device to another

PAN

PAN

Personal area network

MAN

man wired big area network

wireless big area network\


wireless metropolitan area network

WMAN

WLAN

small area network


wireless local area network

POE

power over ethernet

technology can allow administrators to provide power to devices such as wireless access points over Ethernet cable

POE

SSID

Service set identifier is a case sensitive, 32 alphanumeric character unique identifier attached to the header of packets sent over a wireless local-area network (WLAN) that acts as a password when a mobile device tries to connect to the basic service set (BSS) -- a component of the IEEE 802.11 WLAN architecture.

SRP

Spatial Reuse Protocol is a networking protocol developed by Cisco. It is a MAC-layer (a sublayer of the data-link layer (Layer 2) within the OSI Model) protocol for ring-based packet internetworking that is commonly used in optical fiber ring networks.

planning to deploy blackberry mobile devices throughout the company you need to ensure that SRP can be used over the company network which port will need to be enabled

4101

which rf signal characteristic measures a range of frequencies

bandwidth

Rara

Loves Victy

tech uses subscriber station

WMAX

WMAX

Worldwide Interoperability for Microwave Access) is a wireless industry coalition dedicated to the advancement of IEEE 802.16 standards for broadband wireless access (BWA) networks.

use to secure a VPN connection

SSL and IPECCI

IPsec

Internet protocol security (IPsec) is a set of protocols that provides security for Internet Protocol. It can use cryptography to provide security. IPsec can be used for the setting up of virtual private networks (VPNs) in a secure manner. Also known as IP Security.

batch provision

how do you provision a lot of mobile devices at once

inability maintain connection to wireless connection near heavy machinery

Interference

interference

signal distorted by outside sources, radio transmitter, electrical appliances, power lines, heavy machinery

reflection

RF signals bounced off the object without absorbtion

absorption

rf signal absorbed by materials

3g technologies

EVDO and UMTS

EVDO

(EVDO) Evolution data optimized is a 3G standard for CDMA-based networks. As a 3G technology, it focuses on bringing high-speed data to CDMA networks. See: 3G. EVDO provides data rates over 10 times faster than 1xRTT, the previous data technology for CDMA networks.

UTMS

(Universal Mobile Telecommunications Service) is a third-generation (3G) broadband, packet-based transmission of text, digitized voice, video, and multimedia at data rates up to 2 megabits per second (Mbps).

protocols typically associated with configuring email on mobile devices

SMTP port 25, POP3 port 110, and IMAP port 143

download or update internal app only available through corporate app store. Verify currently implemented policy controls are configured correctly

MAM Mobile application management

Back hauling traffic

refers to managing network traffic over the backbone

Backbone network

Refers to larger capacity pipe which carries network traffic between remote networks

GCM

Google cloud messaging

push notification technology can be used to send data and notifications to Android devices

GCM

wireless standards support MIMO antenna configuration

802.11 ac and 802.11n

MIMO

Multiple input multiple output

device placed in a dmz by an administrator

FTP server, email server, internet facing web server

DHCP

Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network.

FTP

File transfer protocol

love you

victy

EAP

Extensible Authentication Protocol

TKIP

(Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs (WLANs). It was designed to provide more secure encryption than the notoriously weak Wired Equivalent Privacy (WEP), the original WLAN security protocol.

WPA

Wi-Fi protected access

PKI

Public Key infrastructure