Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
68 Cards in this Set
- Front
- Back
IMEI |
International mobile equipment identifier |
|
VPN |
Virtual Private Network |
|
Faraday cage |
Blocks radio signals |
|
NAT |
Network address translator ensures IP addresses of users accessing the internet from the internalnetwork appeaer as a public IP address |
|
service account |
which type of mobile device account is typically configured with a non expiring password |
|
SCEP |
Simple certificate enrollment protocol that can be used to securely complete the device enrollment process with mobile device management infrastucture using a secure portal |
|
WEP |
Wired equivalent privacy is a wireless security protocol that uses 64 bit static keys on wireless security |
|
802 11a and 802 11n |
wireless standards can use the 5 ghz frequency band |
|
Configure NAC device to enforce a corporate data back up upon connection to the corporate infrastructure and implement backup policy that is pushed to all corporate mobile devices. |
used as a best practice to back up corporate data stored on a corporate mobile device to a corporate server |
|
NAC |
Network access control |
|
device grouping and administrative permissions |
designing and MDM infrastructure which security requirements should be configured for ease of users and device management |
|
device grouping |
putting users into groups for security purposes to assign a policy to a group |
|
upgrading to a new osi and email client doesnt work and third party osi company doesnt want to fix it |
get a new email client |
|
gateway |
what device do you need to connect networks that use different protocols |
|
push action and internal self service enrollment website |
used within an mdm infrastructure as part of the certificate life cycle to renew an expired device certificate |
|
WSUS |
Windows server update services used to update windows and other microsoft updates |
|
|
secure replacement for telnet |
|
VPN |
virtual private network |
|
SSH |
secure socket shell |
|
native |
application development method that provides the fastest performances and best user experience. |
|
javascript |
computer programming language that is classified as prototype base scripting language can be used for android apps |
|
DDoS attack |
DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. |
|
suspected ddos attack after external website was unavailable for users |
consult the indecent response plan |
|
device does not maintain a constant connection to the cable when being charged. you tried to use different charger and a different cable swapped out battery with a known working one if it doesnt work what do you do |
escalate the issue |
|
wireless risks that would be more likely to affect a wireless network that uses WEP |
Weak keys and main in the middle |
|
man in the middle |
person intercepts data between where it was sent and where it is going attacker eaves drops on communication with out permission |
|
weak keys |
wireless networks that are secured with weak encryption keys short passwords |
|
managed as part of the end of life cycle for mobile platforms within an mdmi |
applications, devices, and operating systems |
|
two bluetooth devices together for the purpose of transferring data from one device to another |
PAN |
|
PAN |
Personal area network |
|
MAN |
man wired big area network |
|
wireless big area network\ wireless metropolitan area network |
WMAN |
|
WLAN |
small area network wireless local area network |
|
POE |
power over ethernet |
|
technology can allow administrators to provide power to devices such as wireless access points over Ethernet cable |
POE |
|
SSID |
Service set identifier is a case sensitive, 32 alphanumeric character unique identifier attached to the header of packets sent over a wireless local-area network (WLAN) that acts as a password when a mobile device tries to connect to the basic service set (BSS) -- a component of the IEEE 802.11 WLAN architecture.
|
|
SRP |
Spatial Reuse Protocol is a networking protocol developed by Cisco. It is a MAC-layer (a sublayer of the data-link layer (Layer 2) within the OSI Model) protocol for ring-based packet internetworking that is commonly used in optical fiber ring networks.
|
|
planning to deploy blackberry mobile devices throughout the company you need to ensure that SRP can be used over the company network which port will need to be enabled |
4101 |
|
which rf signal characteristic measures a range of frequencies |
bandwidth |
|
Rara |
Loves Victy |
|
tech uses subscriber station |
WMAX |
|
WMAX |
Worldwide Interoperability for Microwave Access) is a wireless industry coalition dedicated to the advancement of IEEE 802.16 standards for broadband wireless access (BWA) networks. |
|
use to secure a VPN connection |
SSL and IPECCI |
|
IPsec |
Internet protocol security (IPsec) is a set of protocols that provides security for Internet Protocol. It can use cryptography to provide security. IPsec can be used for the setting up of virtual private networks (VPNs) in a secure manner. Also known as IP Security. |
|
batch provision |
how do you provision a lot of mobile devices at once
|
|
inability maintain connection to wireless connection near heavy machinery |
Interference |
|
interference |
signal distorted by outside sources, radio transmitter, electrical appliances, power lines, heavy machinery |
|
reflection |
RF signals bounced off the object without absorbtion |
|
absorption |
rf signal absorbed by materials |
|
3g technologies |
EVDO and UMTS |
|
EVDO |
(EVDO) Evolution data optimized is a 3G standard for CDMA-based networks. As a 3G technology, it focuses on bringing high-speed data to CDMA networks. See: 3G. EVDO provides data rates over 10 times faster than 1xRTT, the previous data technology for CDMA networks.
|
|
UTMS |
(Universal Mobile Telecommunications Service) is a third-generation (3G) broadband, packet-based transmission of text, digitized voice, video, and multimedia at data rates up to 2 megabits per second (Mbps).
|
|
protocols typically associated with configuring email on mobile devices |
SMTP port 25, POP3 port 110, and IMAP port 143 |
|
download or update internal app only available through corporate app store. Verify currently implemented policy controls are configured correctly |
MAM Mobile application management |
|
Back hauling traffic |
refers to managing network traffic over the backbone |
|
Backbone network |
Refers to larger capacity pipe which carries network traffic between remote networks |
|
GCM |
Google cloud messaging |
|
push notification technology can be used to send data and notifications to Android devices |
GCM |
|
wireless standards support MIMO antenna configuration |
802.11 ac and 802.11n |
|
MIMO |
Multiple input multiple output |
|
device placed in a dmz by an administrator |
FTP server, email server, internet facing web server |
|
DHCP |
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network.
|
|
FTP |
File transfer protocol |
|
love you |
victy |
|
EAP |
Extensible Authentication Protocol |
|
TKIP |
(Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs (WLANs). It was designed to provide more secure encryption than the notoriously weak Wired Equivalent Privacy (WEP), the original WLAN security protocol.
|
|
WPA |
Wi-Fi protected access |
|
PKI |
Public Key infrastructure |