Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
156 Cards in this Set
- Front
- Back
The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other. T or F? |
True |
|
Access points function at which of the following layers of the OSI model? 2 3 4 7 |
2 |
|
Ann, a user, wants to configure the email client on her newly purchased mobile device. Ann wants to ensure that the phone email client and the email server stay synchronized at all times, and that offline changes to the read status of an email will be synchronized once the phone is online. Which of the following should she configure? IMAP, SSMTP, POP3, or SMTP ? |
IMAP |
|
IEEE has divided the ____ layer into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC). a. Session b. Data Link c. Physical d. Transport |
B. Data Link |
|
Which OSI model layer picks the route packets take? a. transport b. physical c. presentation d. network |
d. network |
|
Which layer of the OSI reference model permits the devices on the network to hold ongoing communications across the network? a. presentation b. session c. network d. transport |
b. session |
|
Which of the following is a WiFi topology that occurs when Ann, an end-user, configures her laptop to be a WiFi access point to which another device connects? Gateway,Bluetooth,DMZ, or Ad-hoc ? |
Ad-hoc |
|
Which of the following is a messaging protocol that protects the confidentiality of email content? SSMTP, POP3, SFTP, or IMAP |
SSMTP |
|
Which of the following layers of the OSI model deals with the use of MAC addresses? application layer, transport layer, physical layer, datalink layer |
datalink layer |
|
Which of the following layers of the OSI model is responsible for routing protocols and IP addresses? network layer, datalink layer, application layer, or session layer |
network layer |
|
Which of the following ports is used as alternate SMTP? 25, 443, 587, 2175 |
587 |
|
Which of the following ports is used for relaying email? port 21 port 22 port 23 port 25 |
port 25 |
|
Which of the following protocols can be used to establish a secure terminal session? Telnet, SSH, TLS, VPN |
SSH |
|
Which of the following protocols ensures reliable communication? TCP, UDP, MAC, IP |
TCP |
|
Which of the following protocols is primarily used for transporting email? DNS, POP3, SMTP, FTP |
SMTP |
|
Which of the following protocols is required for iOS device MDM enrollments? VPN, HTTP, APNS, IPsec |
APNS |
|
Which of the following protocols is used for dynamic addressing? DHCP, DNS, NAT, SMTP |
DHCP |
|
Which of the following technologies allows multiple devices to use a single source of authentication for access to services? Proxy services Trusted platform module Directory services VPN concentrator |
Directory services |
|
If you are installing an access point on a ceiling, but find there are no electrical outlets nearby to provide power to the AP, what technology should you deploy? a. SoftAP b. PoE c. Virtual Wifi d. WCN |
b. PoE |
|
Joe, a mobile user, claims he is unable to connect to resources on the WiFi network. Joe has a good signal and an IP address assigned to his device. Which of the following is the BEST troubleshooting technique that the administrator can take? 1. Verify that Joe is able to connect to the cellular network. 2. Verify that Joe is logged on to the network. 3. Check the IP address to ensure it is in the correct range. 4. Check the MAC address of the device. |
3. Check the IP address to ensure it is in the correct range. |
|
Which of the following devices can be used to block a list of known malicious IP addresses at the furthest edge of a corporate network? Network firewall Software firewall NIDS HIPS |
Network Firewall |
|
Which of the following is NOT a major part of an autonomous access point? a. antenna b. wired network interface c. bridging software d. wireless controller |
d. wireless controller |
|
Which of the following is a topology that uses multiple access points to communicate with each other to pass data? filter mesh modulate backhaul |
mesh |
|
Which of the following is the entry point between external resources and internal servers? VPN concentrator Gateway Access point Switch |
Gateway |
|
Which of the following protocols is used to configure devices and to gather information for reporting? POP3 PoE SNMP MIB |
SNMP |
|
Which of the following provides the management and configuration functions for a thin access point? a. mesh access point b. fat access point c. PoE controller d. wireless LAN controller |
d. wireless LAN controller |
|
Which of the following services can be used to improve streaming traffic across networks? UDP DoS SMTP QoS |
QoS |
|
Which of the following technologies allows multiple network devices to have the same public source IPv4 address when communicating with other devices on the Internet? DHCP DNS NAT MAC address |
NAT |
|
Which of the following topologies should an engineer consider when designing a wireless LAN? Bus Star Mesh Token ring |
Mesh |
|
HTTP is run over which of the following ports? (Select TWO). 25 80 110 443 8080 |
80 & 443 |
|
At which layers of the OSI model do 802.11 wireless LANs function? (Choose all that apply.) a. Physical b. Data Link c. Network d. Transport |
A, B, & C |
|
Which of the following ports are used by APNS? (Select TWO). 2175 2195 2196 3389 8080 |
2195 & 2196 |
|
Which of the following are considered security protocols? (Select THREE). TLS GCM POP3 SSL IMAP 3DES SMTP |
TLS SSL 3DES |
|
Which of the following can be used to ensure login credentials are secured when in transit from a mobile device's browser to a web server? (Select THREE). 3DES DES MD5 HTTPS SSL TLS AES |
HTTPS SSL TLS |
|
Match the following ports with their corrosponding protocols: (One of the ports is the answer for two protocols) Protocols: IMAP POP3 SSH Telnet FTP data DNS FTP control HTTPS HTTP Answers: A. 20 B. 53 C. 143 D. 80 E. 22 F. 443 G. 23 H. 110 I. 21 |
IMAP C. 143 POP3 H. 110 SSH E. 22 Telnet G. 23 FTP data A. 20 DNS B. 53 FTP control I. 21 HTTPS F. 443 HTTP D. 80 SSL F. 443 |
|
Antennas play a vital role in receiving signals, but no role in transmitting. T or F? |
False |
|
Highly-directional antennas are generally concave dish-shaped devices. T or F? |
True |
|
Whenever a wave moves to the maximum voltage, then down to the minimum voltage, and then returns back to the starting point, it has finished two cycles. T or F? |
False |
|
A radio signal bounces off hard surfaces and arrives at a point via multiple paths. Which of the following describes this phenomenon? semi-directional parabolic directional omni-directional |
omni-directional |
|
In WiFi, loss of signal strength over distance is a result of which of the following? Attenuation Refraction Reflection Absorption |
Attenuation |
|
In what units is passive gain measured? a. decibels dipole b. decibels isotropic c. effective isotropically radiated power d. intentionally radiated power |
b. decibels isotropic |
|
Power of an electromagnetic signal such as one used in WLANs is measured by which unit? a. millivolts b. milliohms c. milliwatts d. milliamps |
c. milliwatts |
|
The term ____ describes the rate of electrical flow. a. voltage b. electrical power c. resistance d. current |
d. current |
|
What is an Azimuth chart used to represent? a. the total IR power b. the horizontal coverage area c. the elevation coverage d. the vertical coverage area |
b. the horizontal coverage area |
|
What is the positive difference in amplitude between two signals? a. gain b. refraction c. delay spread d. propagation |
a. gain |
|
What is the term that describes the ratio of desired signal to undesired signal in the average power level of a transmission? a. dBm b. FSPL c. SNR d. RSSI |
c. SNR |
|
When an RF signal moves from one medium to another of a different density the signal actually bends instead of traveling in a straight line. This is known as ____. a. absorption b. scattering c. reflection d. refraction |
d. refraction |
|
When multiple signals arrive at a certain location at a given time and disrupt radio signal reception, this is called: interference refraction jamming absorption |
interference |
|
Which describes the natural loss of signal strength through space? a. delay spread b. scattering c. absorption d. free space loss |
d. free space loss |
|
Which measurement indicates how narrow or wide a transmission is? a. beamwidth b. elevation chart c. Fresnel zone d. Azimuth |
a. beamwidth |
|
Which of the following RF behaviors would MOST likely be seen because of heavy snow? refraction diffraction mirroring absorption |
absorption |
|
Which of the following changes with the increase in frequency? wavelength amplitude bandwidth throughput |
wavelength |
|
Which of the following is an example of a faraday cage? Location that blocks API policies Secured enterprise datacenter Location that blocks RF signals Area that secures unauthorized individuals from accessing the datacenter |
Location that blocks RF signals |
|
Which of the following phenomenon results in decreased signal levels due to passing through a solid structure? reflection absorption attenuation refraction |
absorption |
|
Which of the following units is used to measure frequency? a. hertz b. volt c. decibel d. byte |
a. hertz |
|
Which type of antenna is used for long-distance point-to-point wireless links? a. omnidirectional b. semidirectional c. unidirectional d. highly-directional |
d. highly-directional |
|
____ modulation changes the number of waves representing one cycle. a. Amplitude b. Phase shift c. Phase d. Frequency |
d. Frequency |
|
Company employees are reporting wireless network connectivity issues. Which of the following can cause interference for the company wireless network? (Select TWO). microwave ovens refrigerators nearby cell phone towers vending machines bluetooth devices |
microwave ovens & bluetooth devices |
|
Which of the following frequencies fall under the unlicensed spectrum for WiFi network access? (Select TWO). 1 GHz 2.4 GHz 3 GHz 3.5 GHz 5 GHz |
2.4 GHz & 5 GHz |
|
Which of the following are among the basic categories of antenna? (Choose all that apply.) a. semidirectional b. unidirectional c. omnidirectional d. highly-directional |
ALL of them |
|
Which of the following are used to describe the behaviors of waves as they propagate? (Choose all that apply.) a. diffraction b. scattering c. resistance d. absorption |
A, B, and D |
|
It is possible to switch between which of the following technologies? GPRS and GSM LTE and TDMA EDGE and CSD GSM and WiMAX |
GPRS and GSM |
|
Which of the following BEST describes the network elements for 3G and 4G cellular technologies? Mobile device, access point, router, and layer three switch Antenna, mobile device, WiFi device, and domain server name Group policy, mobile ACL, wireless controller, and WiFi Mobile base station and mobile switching center |
Mobile base station and mobile switching center |
|
The main difference between CDMA and TDMA is that: TDMA splits the channel into sequential slices while CDMA uses wide spectrum TDMA uses a single tone to generate modulation while CDMA uses multiple channels modulation TDMA only works in GSM system while CDMA does not support GSM TDMA uses carrier sence multiple access while CDMA uses collision detection |
TDMA splits the channel into sequential slices while CDMA uses wide spectrum |
|
UMTS belongs to which of the following generation of mobile cellular systems? 1G 2G 2.5G 3G |
3G |
|
Which of the following cellular technologies divides digital cellular channels into three separate time slots for a more efficient manner of transporting data than previous methods? RFID 2.5G UTRAN TDMA |
TDMA |
|
Which of the following is a cellular technology that supports data and voice at the same time? APN GSM GPRS EDVO |
GSM |
|
A user traveling overseas is in a place where there is access to WiFi. The user can receive email and talk using VoIP, but cannot place or receive phone calls. Which of the following is the MOST likely cause of this issue? the phone will need a new SIM card incompatible cellular technology ICCID needs to be changed IMEI needs to be changed |
incompatible cellular technology |
|
An administrator receives a call from an executive who had been traveling. The executive informed the administrator that upon returning the service provider bill is much larger than expected. Which of the following MOST likely occurred? Traffic shaping Roaming Latency Content filtering |
Roaming |
|
Roaming between APs takes place in which of the following layers of the OSI model? Data Link Transport Session Presentation |
Data Link |
|
Which of the following is the name of the messaging service Android developers can use within their applications to send messages to Android devices? IMAP APNS POP GCM |
GCM |
|
A BSS is served by one or more APs. T or F? |
False |
|
The IEEE 802.11g standard requires the strongest level of wireless security. T or F? |
False |
|
Given a WiFi deployment using the 2.4GHz band, which of the following channels are the BEST for multiple mobile channel access deployment? 1, 2, 3 1, 6, 11 3, 5, 7 36, 40, 44 |
1, 6, 11 |
|
A wireless network administrator finds that many users are unable to achieve a link-speed of more than 130Mbps. Which of the following is the MOST likely cause? 802.11b is enabled on the network Switches are set to half-duplex NAC is enabled The device supports only 2.4GHz |
The device supports only 2.4GHz |
|
All executive offices are being equipped with a laptop, smart phone, tablet, and printers. The laptop is able to communicate with the other devices through Bluetooth technology. Which of the following is being created in this scenario? SSID VLAN hotspot PAN |
PAN |
|
Joe, a help desk technician, is receiving multiple calls that WiFi is not working in a new area of the building. Joe determines that the coverage should be adequate. Which of the following would be the recommended escalation procedure? log analysis spectrum analysis protocol analyser penetration testing |
spectrum analysis |
|
Which of the following is required to connect to a WiFi network? authentication SSID VLAN DNS server |
SSID |
|
Joe, a technician, is assigned to design a wireless network for a SOHO that has to be able to support video streaming with an acceptable throughput, have good coverage for the building, and be able to support multiple channels with a full duplex capability. Which of the following is the BEST device to choose to support these requirements? 802.11n AP with MIMO 802.11g AP with omni-directional antennas 802.11a AP with point-multipoint antennas Bluetooth PAN |
802.11n AP with MIMO |
|
When setting up a wireless access point for 802.11g, the user must ensure mobile devices utilize which of the following frequency bands? 2.4 GHz 2.4 MHz 5 MHz 5 GHz |
2.4 GHz |
|
Which of the following is a characteristic of 802.11a? 802.11a uses dual band 802.11a is unable to stream video 802.11a uses 5 GHz 802.11a uses 2.4 GHz |
802.11a uses 5 GHz |
|
Which of the following is the BEST approach when installing 802.11 access points in a building to ensure that everyone will get a signal to attach to the WLAN? Configure the adjacent access points in adjacent channel order Configure the adjacent access points to use the same channel Configure the adjacent access points to use channels that do not interfere with each other Configure all the access points in the same floor on the same channel but different floors in different channels |
Configure the adjacent access points to use channels that do not interfere with each other |
|
Which of the following technologies is considered PAN? HSPA+ Bluetooth Edge IR |
Bluetooth |
|
What is the default authentication method according to the 802.11 standard? a. basic b. open system c. private key d. shared key |
b. open system |
|
Joe, a user, wishes to implement a wireless network. The wireless connectivity needs to be available at the maximum distance possible without any additional access points or repeaters. Which of the following technologies provides the maximum native distance? 802.11a 802.11b 802.11g 802.11n |
802.11n |
|
What is the first step in shared key authentication? a. AP encrypts challenge text and sends it to wireless device b. wireless device encrypts challenge text and sends it to AP c. AP sends wireless device an authentication frame that contains a block of text known as the challenge text d. wireless device sends an authentication frame to the AP |
d. wireless device sends an authentication frame to the AP |
|
Which IEEE standard added speeds of 5.5 and 11 Mbps to the WLAN standards? a. 802.11b b. 802.11i c. 802.11g d. 802.11a |
a. 802.11b |
|
If you are setting up a retail business and want to use the latest technology to make customer purchases as easy as possible at the checkout line, which technology are you most likely to deploy? a. BAN b. NFC c. ZigBee d. Bluetooth |
b. NFC |
|
Which of the following provides the management and configuration functions for a thin access point? a. mesh access point b. PoE controller c. fat access point d. wireless LAN controller |
d. wireless LAN controller |
|
Which best describes a BSS? a. a group of wireless devices that is served by a single access point b. a unique identifier c. a geographical area where wireless devices reside d. one or more APs serving a single group of wireless devices |
a. a group of wireless devices that is served by a single access point |
|
Ann, an employee, works remotely most of the time, only visiting the office for quarterly meetings. During one of these visits, a wireless technician picks up a new network that seems to be broadcasting from Ann's laptop. Which of the following types of networks has the technician encountered? WLAN point-to-point VPN ad-hoc |
ad-hoc |
|
Which of the following is NOT true of the Bluetooth technology? a. it uses FHSS b. it uses the 5.0 GHz spectrum c. it is a short-range technology d. Bluesnarfing is a type of attack on a Bluetooth device |
b. it uses the 5.0 GHz spectrum |
|
Which technology is most likely found in applications such as smart lighting, temperature control, and smoke detection? a. NFC b. RFID c. Bluetooth d. ZigBee |
c. Bluetooth |
|
Which of the following statements is true about the 802.11g standard? a. speeds up to 600 Mbps and same radio frequency as 802.11a b. speeds up to 54 Mbps and same radio frequency as 802.11b c. speeds up to 54 Mbps and same radio frequency as 802.11a d. speeds up to 11 Mbps and same radio frequency as 802.11c |
b. speeds up to 54 Mbps and same radio frequency as 802.11b |
|
Which of the following is true about wireless network operation modes? a. a WLAN classified as an IBSS uses an AP b. a WLAN that uses an AP operates in peer-to-peer mode c. a WLAN operating in ad hoc mode does not use an AP d. a WLAN that does not use an AP operates in infrastructure mode |
c. a WLAN operating in ad hoc mode does not use an AP |
|
The Chief Information Officer (CIO) has allowed employees to use their personal devices to access the enterprise guest wireless network. The organization has decided to deploy network configurations through a profile. Which of the following should be specified within the profile for the personal devices? (Select TWO). IPsec configuration password expiration date wireless SSID VPN configuration authentication methods |
wireless SSID & authentication methods |
|
The mobility team has been tasked with placing Wi-Fi access points in a conference room. They have been provided with a floor plan by the building architect. Which of the following are components of a predictive wireless audit? (Select TWO). oscilloscope spectrum analysis distance to nearest cellular tower construction materials used in the walls time domain reflectometer |
spectrum analysis & construction materials used in the walls |
|
Which of the following are the MAIN differences between a lightweight access point and an autonomous access point? (Select THREE). autonomous access points support multiple channels lightweight access points require a central controller after being configured lightweight access points must be preconfigured autonomous access points take less time to manage multiple lightweight access points take less time to manage lightweight access points support fewer users |
lightweight access points require a central controller after being configured & autonomous access points take less time to manage & multiple lightweight access points take less time to manage |
|
Which of the following are wireless LAN service set configurations? (Select Three) a. advanced service set b. basic service set c. extended service set d. independent basic service set |
A, B, C |
|
Which of the following are true about the 802.11ac standard? (Select Three) a. it will operate in the 5 GHz spectrum b. uses channel bandwidths up to 160 MHz c. transmit beam forming is a standard feature d. enhances the SISO technology used in 802.11n |
A, C, D |
|
Which of the following are improvements of the 802.11n standard over previous 802.11 standards? (Select Three) a. different frequencies reduce interference b. security c. coverage area d. data rates up to 1.2 Gbps |
A, B, C |
|
hardware or software that captures packets to decode and analyze theircontents a. manual site survey b. spectrum analyzer c. site survey d. protocol analyzer e. ZigBee f. predictive site survey |
d. protocol analyzer |
|
A site survey that requires walking through the area of the WLAN while carrying a wireless client like a laptop or tablet computer
a. manual site surveyb. spectrum analyzerc. site surveyd. protocol analyzere. ZigBeef. predictive site survey |
a. manual site survey |
|
a device that scans the RF spectrum to can locate potential sources ofinterference
a. manual site surveyb. spectrum analyzerc. site surveyd. protocol analyzere. ZigBeef. predictive site survey |
b. spectrum analyzer |
|
a low-power, short-range, and low-data rate specification that is based on 802.15.4 but that includes standards for network configuration, security and other higher-level features a. manual site surveyb. spectrum analyzerc. site surveyd. protocol analyzere. ZigBeef. predictive site survey |
e. ZigBee |
|
a site survey that is a virtual survey of the area that uses modeling techniques to design the wireless network a. manual site surveyb. spectrum analyzerc. site surveyd. protocol analyzere. ZigBeef. predictive site survey |
f. predictive site survey |
|
an in-depth examination and analysis of a WLAN site a. manual site surveyb. spectrum analyzerc. site surveyd. protocol analyzere. ZigBeef. predictive site survey |
c. site survey |
|
A company replicates their MDM system to a geographically separate backup site. Which of the following is the BEST option to restore normal operations as soon as possible, in the event the main site goes down? Cold site Hot site Intermediate site Warm site |
Hot site |
|
A network administration team will not be able to support an MDM project within the requested timeline. Which of the following would be the BEST option for deploying the Mobile Device Management software? software as a service stand alone solution private cloud hosted externally multi-instance on premise solution |
software as a service |
|
A user's device has not checked-in with MDM for a long period of time. Which of the following would be the MOST likely cause? VPN is turned off Email account was removed PIN was changed MDM profile was removed |
MDM profile was removed |
|
After installation of an MDM solution within an organization, the organization should ensure that all users of mobile devices agree to rules stated in which of the following documents? end-user licensing agreement service level agreement acceptable use policy content filter policy |
acceptable use policy |
|
After registering a device for use with the corporate MDM server, Joe, a user, is unable to receive corporate email. Joe can send and receive personal email, SMS messages, access Internet sites from his device, and place phone calls. Other users are able to access their email from the same server. Which of the following is the MOST likely cause of the problem? the device no longer meets MDM security requirements the WiFi antenna is disabled Joe's mailbox is empty on the server the corporate firewall is not configured properly |
the device no longer meets MDM security requirements |
|
An MDM client was recently installed on a device. The user has reported decreased battery life. Which of the following can be edited to increase battery life? OS version Email push settings Password requirements Speaker settings |
Email push settings |
|
An application is installed through the enterprise MDM application store. An upgrade is issued and a single device does not receive the upgrade as expected. Which of the following is the MOST likely cause? The user does not have a certificate installed. The user is assigned to the incorrect directory services group. The application store is unavailable or has experienced a temporary outage. The application was not signed. |
The user is assigned to the incorrect directory services group. |
|
Ann, a user, has removed or turned off the MDM solution on her device triggering an alert to the network administrator. The network administrator should respond by performing which of the following? Lock the device Wipe the device Quarantine the device Initiate company policy |
Initiate company policy |
|
The correct sequence for deploying a new security profile in an MDM server is: |
create policy, deploy to test group, observe results, deploy profile |
|
The proper order to configure a mobile device for use with an MDM system is: |
install client, sign in to server, accept certificates, install profiles |
|
When configuring user groups that use separate applications managed by the MDM solution, it is important that each group has its own: Policy AUP APNS High availability |
Policy |
|
Which of the following is MOST likely to benefit from an MDM solution to support multiple platforms? BYOD Enterprise application store Self-service portal Onsite support kiosk |
BYOD |
|
Which of the following is the BEST model to deploy managed in-house applications? Cloud storage service Company web server Enterprise application store Email attachments |
Enterprise application store |
|
Which of the following is the BEST practice to create groups within MDM server? Manually create groups Use VLANS Use ACL Use directory services |
Use directory services |
|
Which of the following is the BEST way to ensure users de-provisioned from directory services are also de-provisioned from the MDM solution? Remove user certificate LDAP to MDM SCEP sync with MDM Re-enroll in MDM |
LDAP to MDM |
|
Which of the following conditions are required for an administrator to be able to use an MDM solution to remote wipe a lost device? (Select TWO). The device has network connectivity. The device is locked. The device's PIN is longer than 8 characters. The device has an active VPN connection.The device is enrolled with the MDM. |
The device has network connectivity. & The device is enrolled with the MDM |
|
Which of the following items are valid placements for an MDM solution? (Select TWO). SaaS cellular tower access point on-premise hotspots |
SaaS & on-premise |
|
A WLAN can contain many entry points, making security more difficult than with a wired LAN. T or F? |
True |
|
Open system authentication and shared key authentication are the two types of wireless authentication available under the 802.11 standard. T or F? |
True |
|
With WEP, it is impossible for an attacker to identify two packets derived from the same initialization vector. T or F? |
False |
|
WPA2 uses a block cipher rather than a stream cipher. T or F? |
True |
|
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology? a. complexity b. cost c. security d. availability |
c. security |
|
The process whereby an attacker can trick a corporate mobile device to connect to an impostor AP is referred to as which of the following? a. inserting network traffic b. hijacking the wireless connection c. reading data d. denial of service |
b. hijacking the wireless connection |
|
What is the initialization vector in WEP? a. the shared secret key b. a 24-bit value that changes c. a static 32-bit hexadecimal number d. a cyclical redundancy check value |
b. a 24-bit value that changes |
|
Which is true about WEP? a. must be at least 32 bits in length b. uses a public/private key pair c. uses a shared secret key d. two keys are maintained |
c. uses a shared secret key |
|
Cleartext that has been encrypted is referred to as which of the following? a. cryptography b. ciphertext c. plaintext d. keytext |
b. ciphertext |
|
Searching for unprotected wireless networks is called what? a. wireless fishing b. war driving c. battle testing d. WLAN trolling |
b. war driving |
|
WEP guards one of the CIA characteristics, namely what? a. integrity b. availability c. access control d. confidentiality |
d. confidentiality |
|
Which type of access control is implemented by recording the physical address of a wireless client into software running on the AP? a. NIC blocking b. MAC address filtering c. Network blocking d. IP address filtering |
b. MAC address filtering |
|
Ann, a user, cannot access the company WiFi. She states that the WiFi signal is present and she has chosen the right SSID; however, each time Ann tries to access the network, she gets rejected. Which of the following is the BEST method to determine whether the mobile device is authorized to connect to the WiFi network? Check if Ann is placed in the DMZ location of the company Ensure the authentication server is up and running Check the ACL for Ann's device MAC entry Ensure the firewalls are all activated for that particular SSID |
Check the ACL for Ann's device MAC entry |
|
An attacker spoofs frames to prevent a client from remaining connected to the WLAN. What type of an attack is this? a. RF jamming b. man-in-the-middle c. hijacking d. denial of service |
d. denial of service |
|
Which of the following is the BEST way to mitigate risk associated with a BYOD deployment? Content filtering Virtualization Containerization WPA2 |
Containerization |
|
An administrator is tasked with implementing disk encryption for information stored on a mobile device with at least 128-bits of strength. Which of the following should be applied to meet this requirement? AES SSL SHA-1 DES |
AES |
|
An information security consultant has recommended that mobile devices for special agents use two-factor authentication. Which of the following would fulfill this requirement? key fob and swipe card pattern swipe and facial scan fingerprint and retina scan PIN and complex password |
pattern swipe and facial scan |
|
In case of loss or theft, which of the following methods is used to prevent corporate-based data being compromised? access control list password policy firewall full-disk encryption |
full-disk encryption |
|
Joe, a corporate MDM administrator, needs to implement device encryption. Which of the following would provide the BEST encryption? data in transit encryption block level device encryption folder level device encryption whole device encryption |
whole device encryption |
|
Which of the following encryption methods will be the BEST way to secure the company wireless network? WAP WPA-TKIP WEP WPA2-CCMP |
WPA2-CCMP |
|
Which of the following is MOST likely to be used by default for WPA2? AES TKIP WEP 3DES |
AES |
|
Which of the following methods would MOST likely prevent a laptop from being booted without the correct key or password? file-level encryption full-disk encryption folder level encryption removable media encryption |
full-disk encryption |
|
Which of the following should MOST likely be used at corporate headquarters to secure transmission between a mobile device and a wireless access point? VPN SSL WPA2 TLS |
WPA2 |
|
Which of the following should be implemented when a personally owned mobile device is used to access business sensitive data, and the company is concerned with users extracting the company's sensitive data from the device? device lock and remote wipe should be enforced on the personal device a software container policy should wrap and encrypt both the user and company data encryption should be enabled when company data is transmitted and received a secure container device policy should separate company data from personal data |
a secure container device policy should separate company data from personal data |
|
Which of the following technologies allows secure communication with a previously unverified entity? VPN IMAP TKIP PKI |
PKI |
|
Which encryption protocol is used for 802.11i/WPA2? a. CCMP b. PSK c. RSN d. TKIP |
d. TKIP |
|
802.1X utilizes EAP. Which is a correct statement about EAP? a. EAP uses two types of packets to perform authentication b. EAP is one of the strongest encryption protocols c. EAP is used by WEP2 to resolve some of WEP2’s weaknesses d. EAP is a framework for transporting authentication protocol |
d. EAP is a framework for transporting authentication protocol |
|
Which of the following are used to secure data in transit? (Select 2) IPsec WPA block level encryption FTP file level encryption |
IPsec & WPA |
|
Which of the following can be used to secure data at rest? (Select 2) VPN AES SSL 3DES IPsec |
AES & 3DES |
|
Which of the following are TKIP enhancement areas? (Select 2) a. the IV is enhanced to effectively eliminate collisions b. different keys are used for different types of traffic c. a 40-bit encryption key is manually entered on APs and devices. d. the required key length is increased to 128 bits |
A, B, D |
|
What three categories can the protections implemented in the original 802.11 standard be divided into? (Select 3) a. authentication b. MAC address filtering c. wired equivalent privacy d. access control |
A, C, D |
|
Which of the following are weaknesses of MAC address filtering? (Select 3) a. only Windows uses MAC addresses, excluding other OSs from this method b. MAC address management can be difficult c. the MAC address can be captured by forcing a reassociation d. MAC addresses can be spoofed |
B, C, D |