Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
Which of the following layers involves using a CAT5e cable on a LAN?
a) Physical |
a) Physical |
|
Which of the following protocols resolves hostnames to IP addresses?
a) NAT |
b) DNS |
|
Use of a fingerprint or retina scan to authenticate to a system instead of typing a password is an example of which of the following authentication methods?
a) Biometric |
a) Biometric |
|
Which of the following frequencies is assigned to WiFi?
a) 850 MHz |
d) 2.4 GHz
|
|
Ann, a mobile engineer, is conducting site surveys to determine which frequencies are available. Which of the following should Ann use?
a) Bluetooth device |
c) Spectrum analyzer |
|
For this question, decide whether the action makes it likely or unlikely that the trainer Which of the following conditions is MOST likely to place a device out of compliance with a company’s policy requirements?
a) End-user has used the same PIN as the debit card |
b) End-user has modified the default OS of the device |
|
How many layers are in the OSI model?
a) 2 |
c) 7 |
|
Joe, a user, contacts the helpdesk stating his keyboard is not functioning on his mobile device. After the technician has fully resolved the issue, which of the following should be completed?
a) Identify potential effects |
d) Document the findings
|
|
Which of the following is the BEST option to disable application inventory and location information from executive mobile devices while obtaining the same information from the rest of the employee mobile devices?
a) Deploy different mobile operating systems to executives and employees |
b) Apply group-based policies on MDM server |
|
Ann, an employee, is planning to travel internationally. Which of the following should an administrator perform FIRST to confirm Ann’s mobile device will function in the destination country?
a) Contact the cellular provider |
a) Contact the cellular provider |
|
When Ann, a user, moves between locations in a building she loses connectivity. The administrator takes a survey on the building floors and realizes that while moving from one location to the other the signal fades then comes back again. Which of the following is the BEST explanation?
a) The IP address is invalid |
d) The issue is related to attenuation
|
|
Which of the following is the BEST configuration to improve the security of data on a mobile device?
a) Configure the remote lock feature so if the mobile device is stolen it can be unlocked after recovery |
b) Configure remote wipe so if the mobile device is stolen its content can be erased |
|
Joe, a user, is being blocked from a website on his mobile device that is needed for him to do his job. Which of the following is the BEST course of action for the network administrator to take in order to allow this website?
a) Turn off related content filter category |
b) Whitelist the site |
|
A network administrator notices an unusual volume of mobile device traffic going out over FTP to one particular unknown location. Which of the following ports should be blocked?
a) 21 |
a) 21 |
|
Joe, a user, reports that his wireless Internet connection seems slow, and he suspects it is being used by unauthorized persons. Which of the following should be implemented to help secure the wireless connection?
a) 802.11g |
b) WPA2 |