• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back

Which of the following layers involves using a CAT5e cable on a LAN?



a) Physical
b) Session
c) Transport
d) Application

a) Physical

Which of the following protocols resolves hostnames to IP addresses?



a) NAT
b) DNS
c) MAC
d) DHCP

b) DNS

Use of a fingerprint or retina scan to authenticate to a system instead of typing a password is an example of which of the following authentication methods?



a) Biometric
b) PKI
c) Token
d) Multifactor

a) Biometric

Which of the following frequencies is assigned to WiFi?



a) 850 MHz
b) 900 MHz
c) 1.2 GHZ
d) 2.4 GHz

d) 2.4 GHz


Ann, a mobile engineer, is conducting site surveys to determine which frequencies are available. Which of the following should Ann use?



a) Bluetooth device
b) GPS navigator
c) Spectrum analyzer
d) Multi-meter

c) Spectrum analyzer

For this question, decide whether the action makes it likely or unlikely that the trainer Which of the following conditions is MOST likely to place a device out of compliance with a company’s policy requirements?



a) End-user has used the same PIN as the debit card
b) End-user has modified the default OS of the device
c) End-user has sent personal email from the device
d) End-user allowed another employee to use the device

b) End-user has modified the default OS of the device

How many layers are in the OSI model?



a) 2
b) 10
c) 7
d) 5

c) 7

Joe, a user, contacts the helpdesk stating his keyboard is not functioning on his mobile device. After the technician has fully resolved the issue, which of the following should be completed?



a) Identify potential effects
b) Create a plan of action
c) Test the solution
d) Document the findings

d) Document the findings


Which of the following is the BEST option to disable application inventory and location information from executive mobile devices while obtaining the same information from the rest of the employee mobile devices?



a) Deploy different mobile operating systems to executives and employees
b) Apply group-based policies on MDM server
c) Use access control list on MDM server
d) Deploy different MDM server for executives and employees

b) Apply group-based policies on MDM server

Ann, an employee, is planning to travel internationally. Which of the following should an administrator perform FIRST to confirm Ann’s mobile device will function in the destination country?



a) Contact the cellular provider
b) Reset the device to factory settings
c) Install an international travel application
d) Replace the battery and confirm the cellular strength

a) Contact the cellular provider

When Ann, a user, moves between locations in a building she loses connectivity. The administrator takes a survey on the building floors and realizes that while moving from one location to the other the signal fades then comes back again. Which of the following is the BEST explanation?



a) The IP address is invalid
b) The mobile devices have weak receivers
c) The mobile device battery is low
d) The issue is related to attenuation

d) The issue is related to attenuation


Which of the following is the BEST configuration to improve the security of data on a mobile device?



a) Configure the remote lock feature so if the mobile device is stolen it can be unlocked after recovery
b) Configure remote wipe so if the mobile device is stolen its content can be erased
c) Configure remote reporting so that the mobile device can report when it is stolen
d) Configure remote control on the mobile device so it can be remotely administered

b) Configure remote wipe so if the mobile device is stolen its content can be erased

Joe, a user, is being blocked from a website on his mobile device that is needed for him to do his job. Which of the following is the BEST course of action for the network administrator to take in order to allow this website?



a) Turn off related content filter category
b) Whitelist the site
c) Turn off content filtering
d) Blacklist the site

b) Whitelist the site

A network administrator notices an unusual volume of mobile device traffic going out over FTP to one particular unknown location. Which of the following ports should be blocked?



a) 21
b) 80
c) 143
d) 990

a) 21

Joe, a user, reports that his wireless Internet connection seems slow, and he suspects it is being used by unauthorized persons. Which of the following should be implemented to help secure the wireless connection?



a) 802.11g
b) WPA2
c) SSID
d) PAN

b) WPA2