• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/156

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

156 Cards in this Set

  • Front
  • Back

The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other. T or F?

True

Access points function at which of the following layers of the OSI model?


2


3


4


7

2

Ann, a user, wants to configure the email client on her newly purchased mobile device. Ann wants to ensure that the phone email client and the email server stay synchronized at all times, and that offline changes to the read status of an email will be synchronized once the phone is online. Which of the following should she configure?


IMAP, SSMTP, POP3, or SMTP ?

IMAP

IEEE has divided the ____ layer into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC).


a. Session b. Data Link c. Physical d. Transport

B. Data Link

Which OSI model layer picks the route packets take?


a. transport b. physical c. presentation d. network

d. network

Which layer of the OSI reference model permits the devices on the network to hold ongoing communications across the network?


a. presentation b. session c. network d. transport

b. session

Which of the following is a WiFi topology that occurs when Ann, an end-user, configures her laptop to be a WiFi access point to which another device connects?


Gateway,Bluetooth,DMZ, or Ad-hoc ?

Ad-hoc

Which of the following is a messaging protocol that protects the confidentiality of email content?


SSMTP, POP3, SFTP, or IMAP

SSMTP

Which of the following layers of the OSI model deals with the use of MAC addresses?


application layer, transport layer, physical layer, datalink layer

datalink layer

Which of the following layers of the OSI model is responsible for routing protocols and IP addresses?


network layer, datalink layer, application layer, or session layer

network layer

Which of the following ports is used as alternate SMTP?




25, 443, 587, 2175

587

Which of the following ports is used for relaying email?


port 21 port 22 port 23 port 25

port 25

Which of the following protocols can be used to establish a secure terminal session?


Telnet, SSH, TLS, VPN

SSH

Which of the following protocols ensures reliable communication?


TCP, UDP, MAC, IP

TCP

Which of the following protocols is primarily used for transporting email?


DNS, POP3, SMTP, FTP

SMTP

Which of the following protocols is required for iOS device MDM enrollments?


VPN, HTTP, APNS, IPsec

APNS

Which of the following protocols is used for dynamic addressing?


DHCP, DNS, NAT, SMTP

DHCP

Which of the following technologies allows multiple devices to use a single source of authentication for access to services?


Proxy services


Trusted platform module


Directory services


VPN concentrator

Directory services

If you are installing an access point on a ceiling, but find there are no electrical outlets nearby to provide power to the AP, what technology should you deploy?


a. SoftAP b. PoE c. Virtual Wifi d. WCN

b. PoE

Joe, a mobile user, claims he is unable to connect to resources on the WiFi network. Joe has a good signal and an IP address assigned to his device. Which of the following is the BEST troubleshooting technique that the administrator can take?


1. Verify that Joe is able to connect to the cellular network.


2. Verify that Joe is logged on to the network.


3. Check the IP address to ensure it is in the correct range.


4. Check the MAC address of the device.

3. Check the IP address to ensure it is in the correct range.

Which of the following devices can be used to block a list of known malicious IP addresses at the furthest edge of a corporate network?


Network firewall


Software firewall


NIDS


HIPS

Network Firewall

Which of the following is NOT a major part of an autonomous access point?


a. antenna


b. wired network interface


c. bridging software


d. wireless controller

d. wireless controller

Which of the following is a topology that uses multiple access points to communicate with each other to pass data?


filter


mesh


modulate


backhaul

mesh

Which of the following is the entry point between external resources and internal servers?


VPN concentrator


Gateway


Access point


Switch

Gateway

Which of the following protocols is used to configure devices and to gather information for reporting?


POP3


PoE


SNMP


MIB

SNMP

Which of the following provides the management and configuration functions for a thin access point?


a. mesh access point b. fat access point c. PoE controller d. wireless LAN controller

d. wireless LAN controller

Which of the following services can be used to improve streaming traffic across networks?


UDP


DoS


SMTP


QoS

QoS

Which of the following technologies allows multiple network devices to have the same public source IPv4 address when communicating with other devices on the Internet?


DHCP


DNS


NAT


MAC address

NAT

Which of the following topologies should an engineer consider when designing a wireless LAN?


Bus


Star


Mesh


Token ring

Mesh

HTTP is run over which of the following ports? (Select TWO).


25


80


110


443


8080

80 & 443

At which layers of the OSI model do 802.11 wireless LANs function? (Choose all that apply.)


a. Physical b. Data Link c. Network d. Transport

A, B, & C

Which of the following ports are used by APNS? (Select TWO).


2175 2195 2196 3389 8080

2195 & 2196

Which of the following are considered security protocols? (Select THREE).


TLS GCM POP3 SSL IMAP 3DES SMTP

TLS


SSL


3DES

Which of the following can be used to ensure login credentials are secured when in transit from a mobile device's browser to a web server? (Select THREE).


3DES DES MD5 HTTPS SSL TLS AES

HTTPS


SSL


TLS

Match the following ports with their corrosponding protocols: (One of the ports is the answer for two protocols)


Protocols:


IMAP


POP3


SSH


Telnet


FTP data


DNS


FTP control


HTTPS


HTTP




Answers: A. 20 B. 53 C. 143 D. 80 E. 22 F. 443 G. 23 H. 110 I. 21

IMAP C. 143


POP3 H. 110


SSH E. 22


Telnet G. 23


FTP data A. 20


DNS B. 53


FTP control I. 21


HTTPS F. 443


HTTP D. 80


SSL F. 443

Antennas play a vital role in receiving signals, but no role in transmitting. T or F?

False

Highly-directional antennas are generally concave dish-shaped devices. T or F?

True

Whenever a wave moves to the maximum voltage, then down to the minimum voltage, and then returns back to the starting point, it has finished two cycles. T or F?

False

A radio signal bounces off hard surfaces and arrives at a point via multiple paths. Which of the following describes this phenomenon?




semi-directional


parabolic


directional


omni-directional

omni-directional

In WiFi, loss of signal strength over distance is a result of which of the following?


Attenuation


Refraction


Reflection


Absorption

Attenuation

In what units is passive gain measured?


a. decibels dipole


b. decibels isotropic


c. effective isotropically radiated power


d. intentionally radiated power

b. decibels isotropic

Power of an electromagnetic signal such as one used in WLANs is measured by which unit?




a. millivolts


b. milliohms


c. milliwatts


d. milliamps

c. milliwatts

The term ____ describes the rate of electrical flow.




a. voltage


b. electrical power


c. resistance


d. current

d. current

What is an Azimuth chart used to represent?


a. the total IR power


b. the horizontal coverage area


c. the elevation coverage


d. the vertical coverage area

b. the horizontal coverage area

What is the positive difference in amplitude between two signals?


a. gain


b. refraction


c. delay spread


d. propagation

a. gain

What is the term that describes the ratio of desired signal to undesired signal in the average power level of a transmission?




a. dBm


b. FSPL


c. SNR


d. RSSI

c. SNR

When an RF signal moves from one medium to another of a different density the signal actually bends instead of traveling in a straight line. This is known as ____.




a. absorption


b. scattering


c. reflection


d. refraction

d. refraction

When multiple signals arrive at a certain location at a given time and disrupt radio signal reception, this is called:




interference


refraction


jamming


absorption

interference

Which describes the natural loss of signal strength through space?




a. delay spread


b. scattering


c. absorption


d. free space loss

d. free space loss

Which measurement indicates how narrow or wide a transmission is?




a. beamwidth


b. elevation chart


c. Fresnel zone


d. Azimuth

a. beamwidth

Which of the following RF behaviors would MOST likely be seen because of heavy snow?




refraction


diffraction


mirroring


absorption

absorption

Which of the following changes with the increase in frequency?




wavelength


amplitude


bandwidth


throughput

wavelength

Which of the following is an example of a faraday cage?




Location that blocks API policies


Secured enterprise datacenter


Location that blocks RF signals


Area that secures unauthorized individuals from accessing the datacenter

Location that blocks RF signals

Which of the following phenomenon results in decreased signal levels due to passing through a solid structure?




reflection


absorption


attenuation


refraction

absorption

Which of the following units is used to measure frequency?




a. hertz


b. volt


c. decibel


d. byte

a. hertz

Which type of antenna is used for long-distance point-to-point wireless links?




a. omnidirectional


b. semidirectional


c. unidirectional


d. highly-directional

d. highly-directional

____ modulation changes the number of waves representing one cycle.




a. Amplitude


b. Phase shift


c. Phase


d. Frequency

d. Frequency

Company employees are reporting wireless network connectivity issues. Which of the following can cause interference for the company wireless network? (Select TWO).


microwave ovens


refrigerators


nearby cell phone towers


vending machines


bluetooth devices

microwave ovens


&


bluetooth devices

Which of the following frequencies fall under the unlicensed spectrum for WiFi network access? (Select TWO).




1 GHz


2.4 GHz


3 GHz


3.5 GHz


5 GHz

2.4 GHz & 5 GHz

Which of the following are among the basic categories of antenna? (Choose all that apply.)




a. semidirectional


b. unidirectional


c. omnidirectional


d. highly-directional

ALL of them

Which of the following are used to describe the behaviors of waves as they propagate? (Choose all that apply.)




a. diffraction


b. scattering


c. resistance


d. absorption

A, B, and D

It is possible to switch between which of the following technologies?




GPRS and GSM


LTE and TDMA


EDGE and CSD


GSM and WiMAX

GPRS and GSM

Which of the following BEST describes the network elements for 3G and 4G cellular technologies?




Mobile device, access point, router, and layer three switch


Antenna, mobile device, WiFi device, and domain server name


Group policy, mobile ACL, wireless controller, and WiFi


Mobile base station and mobile switching center

Mobile base station and mobile switching center

The main difference between CDMA and TDMA is that:




TDMA splits the channel into sequential slices while CDMA uses wide spectrum


TDMA uses a single tone to generate modulation while CDMA uses multiple channels modulation


TDMA only works in GSM system while CDMA does not support GSM


TDMA uses carrier sence multiple access while CDMA uses collision detection

TDMA splits the channel into sequential slices while CDMA uses wide spectrum

UMTS belongs to which of the following generation of mobile cellular systems?




1G


2G


2.5G


3G

3G

Which of the following cellular technologies divides digital cellular channels into three separate time slots for a more efficient manner of transporting data than previous methods?




RFID


2.5G


UTRAN


TDMA

TDMA

Which of the following is a cellular technology that supports data and voice at the same time?




APN


GSM


GPRS


EDVO

GSM

A user traveling overseas is in a place where there is access to WiFi. The user can receive email and talk using VoIP, but cannot place or receive phone calls. Which of the following is the MOST likely cause of this issue?




the phone will need a new SIM card


incompatible cellular technology


ICCID needs to be changed


IMEI needs to be changed

incompatible cellular technology

An administrator receives a call from an executive who had been traveling. The executive informed the administrator that upon returning the service provider bill is much larger than expected. Which of the following MOST likely occurred?




Traffic shaping


Roaming


Latency


Content filtering

Roaming

Roaming between APs takes place in which of the following layers of the OSI model?




Data Link


Transport


Session


Presentation

Data Link

Which of the following is the name of the messaging service Android developers can use within their applications to send messages to Android devices?




IMAP


APNS


POP


GCM

GCM

A BSS is served by one or more APs. T or F?

False

The IEEE 802.11g standard requires the strongest level of wireless security. T or F?

False

Given a WiFi deployment using the 2.4GHz band, which of the following channels are the BEST for multiple mobile channel access deployment?


1, 2, 3


1, 6, 11


3, 5, 7


36, 40, 44

1, 6, 11

A wireless network administrator finds that many users are unable to achieve a link-speed of more than 130Mbps. Which of the following is the MOST likely cause?


802.11b is enabled on the network


Switches are set to half-duplex


NAC is enabled


The device supports only 2.4GHz

The device supports only 2.4GHz

All executive offices are being equipped with a laptop, smart phone, tablet, and printers. The laptop is able to communicate with the other devices through Bluetooth technology. Which of the following is being created in this scenario?




SSID


VLAN


hotspot


PAN

PAN

Joe, a help desk technician, is receiving multiple calls that WiFi is not working in a new area of the building. Joe determines that the coverage should be adequate. Which of the following would be the recommended escalation procedure?


log analysis


spectrum analysis


protocol analyser


penetration testing

spectrum analysis

Which of the following is required to connect to a WiFi network?




authentication


SSID


VLAN


DNS server

SSID

Joe, a technician, is assigned to design a wireless network for a SOHO that has to be able to support video streaming with an acceptable throughput, have good coverage for the building, and be able to support multiple channels with a full duplex capability. Which of the following is the BEST device to choose to support these requirements?




802.11n AP with MIMO


802.11g AP with omni-directional antennas


802.11a AP with point-multipoint antennas


Bluetooth PAN

802.11n AP with MIMO

When setting up a wireless access point for 802.11g, the user must ensure mobile devices utilize which of the following frequency bands?




2.4 GHz


2.4 MHz


5 MHz


5 GHz

2.4 GHz

Which of the following is a characteristic of 802.11a?




802.11a uses dual band


802.11a is unable to stream video


802.11a uses 5 GHz


802.11a uses 2.4 GHz

802.11a uses 5 GHz

Which of the following is the BEST approach when installing 802.11 access points in a building to ensure that everyone will get a signal to attach to the WLAN?




Configure the adjacent access points in adjacent channel order


Configure the adjacent access points to use the same channel


Configure the adjacent access points to use channels that do not interfere with each other


Configure all the access points in the same floor on the same channel but different floors in different channels

Configure the adjacent access points to use channels that do not interfere with each other

Which of the following technologies is considered PAN?




HSPA+


Bluetooth


Edge


IR

Bluetooth

What is the default authentication method according to the 802.11 standard?




a. basic


b. open system


c. private key


d. shared key

b. open system

Joe, a user, wishes to implement a wireless network. The wireless connectivity needs to be available at the maximum distance possible without any additional access points or repeaters. Which of the following technologies provides the maximum native distance?




802.11a


802.11b


802.11g


802.11n

802.11n

What is the first step in shared key authentication?




a. AP encrypts challenge text and sends it to wireless device


b. wireless device encrypts challenge text and sends it to AP


c. AP sends wireless device an authentication frame that contains a block of text known as the challenge text


d. wireless device sends an authentication frame to the AP

d. wireless device sends an authentication frame to the AP

Which IEEE standard added speeds of 5.5 and 11 Mbps to the WLAN standards?




a. 802.11b


b. 802.11i


c. 802.11g


d. 802.11a

a. 802.11b

If you are setting up a retail business and want to use the latest technology to make customer purchases as easy as possible at the checkout line, which technology are you most likely to deploy?


a. BAN


b. NFC


c. ZigBee


d. Bluetooth

b. NFC

Which of the following provides the management and configuration functions for a thin access point?




a. mesh access point


b. PoE controller


c. fat access point


d. wireless LAN controller

d. wireless LAN controller

Which best describes a BSS?




a. a group of wireless devices that is served by a single access point


b. a unique identifier


c. a geographical area where wireless devices reside


d. one or more APs serving a single group of wireless devices

a. a group of wireless devices that is served by a single access point

Ann, an employee, works remotely most of the time, only visiting the office for quarterly meetings. During one of these visits, a wireless technician picks up a new network that seems to be broadcasting from Ann's laptop. Which of the following types of networks has the technician encountered?




WLAN


point-to-point


VPN


ad-hoc

ad-hoc

Which of the following is NOT true of the Bluetooth technology?




a. it uses FHSS


b. it uses the 5.0 GHz spectrum


c. it is a short-range technology


d. Bluesnarfing is a type of attack on a Bluetooth device

b. it uses the 5.0 GHz spectrum

Which technology is most likely found in applications such as smart lighting, temperature control, and smoke detection?


a. NFC


b. RFID


c. Bluetooth


d. ZigBee

c. Bluetooth

Which of the following statements is true about the 802.11g standard?




a. speeds up to 600 Mbps and same radio frequency as 802.11a


b. speeds up to 54 Mbps and same radio frequency as 802.11b


c. speeds up to 54 Mbps and same radio frequency as 802.11a


d. speeds up to 11 Mbps and same radio frequency as 802.11c

b. speeds up to 54 Mbps and same radio frequency as 802.11b

Which of the following is true about wireless network operation modes?


a. a WLAN classified as an IBSS uses an AP


b. a WLAN that uses an AP operates in peer-to-peer mode


c. a WLAN operating in ad hoc mode does not use an AP


d. a WLAN that does not use an AP operates in infrastructure mode

c. a WLAN operating in ad hoc mode does not use an AP

The Chief Information Officer (CIO) has allowed employees to use their personal devices to access the enterprise guest wireless network. The organization has decided to deploy network configurations through a profile. Which of the following should be specified within the profile for the personal devices? (Select TWO).




IPsec configuration


password expiration date


wireless SSID


VPN configuration


authentication methods

wireless SSID


&


authentication methods

The mobility team has been tasked with placing Wi-Fi access points in a conference room. They have been provided with a floor plan by the building architect. Which of the following are components of a predictive wireless audit? (Select TWO).




oscilloscope


spectrum analysis


distance to nearest cellular tower


construction materials used in the walls


time domain reflectometer

spectrum analysis


& construction materials used in the walls

Which of the following are the MAIN differences between a lightweight access point and an autonomous access point? (Select THREE).




autonomous access points support multiple channels


lightweight access points require a central controller after being configured


lightweight access points must be preconfigured


autonomous access points take less time to manage


multiple lightweight access points take less time to manage


lightweight access points support fewer users

lightweight access points require a central controller after being configured


& autonomous access points take less time to manage


& multiple lightweight access points take less time to manage

Which of the following are wireless LAN service set configurations? (Select Three)




a. advanced service set


b. basic service set


c. extended service set


d. independent basic service set

A, B, C

Which of the following are true about the 802.11ac standard? (Select Three)




a. it will operate in the 5 GHz spectrum


b. uses channel bandwidths up to 160 MHz


c. transmit beam forming is a standard feature


d. enhances the SISO technology used in 802.11n

A, C, D

Which of the following are improvements of the 802.11n standard over previous 802.11 standards? (Select Three)


a. different frequencies reduce interference


b. security


c. coverage area


d. data rates up to 1.2 Gbps

A, B, C

hardware or software that captures packets to decode and analyze theircontents




a. manual site survey


b. spectrum analyzer


c. site survey


d. protocol analyzer


e. ZigBee


f. predictive site survey

d. protocol analyzer

A site survey that requires walking through the area of the WLAN while carrying a wireless client like a laptop or tablet computer



a. manual site surveyb. spectrum analyzerc. site surveyd. protocol analyzere. ZigBeef. predictive site survey



a. manual site survey

a device that scans the RF spectrum to can locate potential sources ofinterference



a. manual site surveyb. spectrum analyzerc. site surveyd. protocol analyzere. ZigBeef. predictive site survey

b. spectrum analyzer

a low-power, short-range, and low-data rate specification that is based on 802.15.4 but that includes standards for network configuration, security and other higher-level features




a. manual site surveyb. spectrum analyzerc. site surveyd. protocol analyzere. ZigBeef. predictive site survey

e. ZigBee

a site survey that is a virtual survey of the area that uses modeling techniques to design the wireless network




a. manual site surveyb. spectrum analyzerc. site surveyd. protocol analyzere. ZigBeef. predictive site survey

f. predictive site survey

an in-depth examination and analysis of a WLAN site




a. manual site surveyb. spectrum analyzerc. site surveyd. protocol analyzere. ZigBeef. predictive site survey

c. site survey

A company replicates their MDM system to a geographically separate backup site. Which of the following is the BEST option to restore normal operations as soon as possible, in the event the main site goes down?




Cold site


Hot site


Intermediate site


Warm site

Hot site

A network administration team will not be able to support an MDM project within the requested timeline. Which of the following would be the BEST option for deploying the Mobile Device Management software?




software as a service


stand alone solution


private cloud hosted externally


multi-instance on premise solution

software as a service

A user's device has not checked-in with MDM for a long period of time. Which of the following would be the MOST likely cause?




VPN is turned off


Email account was removed


PIN was changed


MDM profile was removed

MDM profile was removed

After installation of an MDM solution within an organization, the organization should ensure that all users of mobile devices agree to rules stated in which of the following documents?




end-user licensing agreement


service level agreement


acceptable use policy


content filter policy

acceptable use policy

After registering a device for use with the corporate MDM server, Joe, a user, is unable to receive corporate email. Joe can send and receive personal email, SMS messages, access Internet sites from his device, and place phone calls. Other users are able to access their email from the same server. Which of the following is the MOST likely cause of the problem?




the device no longer meets MDM security requirements


the WiFi antenna is disabled


Joe's mailbox is empty on the server


the corporate firewall is not configured properly

the device no longer meets MDM security requirements

An MDM client was recently installed on a device. The user has reported decreased battery life. Which of the following can be edited to increase battery life?




OS version


Email push settings


Password requirements


Speaker settings

Email push settings

An application is installed through the enterprise MDM application store. An upgrade is issued and a single device does not receive the upgrade as expected. Which of the following is the MOST likely cause?




The user does not have a certificate installed.


The user is assigned to the incorrect directory services group.


The application store is unavailable or has experienced a temporary outage.


The application was not signed.

The user is assigned to the incorrect directory services group.

Ann, a user, has removed or turned off the MDM solution on her device triggering an alert to the network administrator. The network administrator should respond by performing which of the following?




Lock the device


Wipe the device


Quarantine the device


Initiate company policy

Initiate company policy

The correct sequence for deploying a new security profile in an MDM server is:



create policy, deploy to test group, observe results, deploy profile

The proper order to configure a mobile device for use with an MDM system is:

install client, sign in to server, accept certificates, install profiles

When configuring user groups that use separate applications managed by the MDM solution, it is important that each group has its own:




Policy


AUP


APNS


High availability

Policy

Which of the following is MOST likely to benefit from an MDM solution to support multiple platforms?




BYOD


Enterprise application store


Self-service portal


Onsite support kiosk

BYOD

Which of the following is the BEST model to deploy managed in-house applications?




Cloud storage service


Company web server


Enterprise application store


Email attachments

Enterprise application store

Which of the following is the BEST practice to create groups within MDM server?




Manually create groups


Use VLANS


Use ACL


Use directory services

Use directory services

Which of the following is the BEST way to ensure users de-provisioned from directory services are also de-provisioned from the MDM solution?




Remove user certificate


LDAP to MDM


SCEP sync with MDM


Re-enroll in MDM

LDAP to MDM

Which of the following conditions are required for an administrator to be able to use an MDM solution to remote wipe a lost device? (Select TWO).




The device has network connectivity.


The device is locked.


The device's PIN is longer than 8 characters.


The device has an active VPN connection.The device is enrolled with the MDM.

The device has network connectivity.


&


The device is enrolled with the MDM

Which of the following items are valid placements for an MDM solution? (Select TWO).




SaaS


cellular tower


access point


on-premise


hotspots

SaaS & on-premise

A WLAN can contain many entry points, making security more difficult than with a wired LAN.


T or F?

True

Open system authentication and shared key authentication are the two types of wireless authentication available under the 802.11 standard. T or F?

True

With WEP, it is impossible for an attacker to identify two packets derived from the same initialization vector. T or F?

False

WPA2 uses a block cipher rather than a stream cipher. T or F?

True

What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?




a. complexity


b. cost


c. security


d. availability

c. security

The process whereby an attacker can trick a corporate mobile device to connect to an impostor AP is referred to as which of the following?




a. inserting network traffic


b. hijacking the wireless connection


c. reading data


d. denial of service

b. hijacking the wireless connection

What is the initialization vector in WEP?




a. the shared secret key


b. a 24-bit value that changes


c. a static 32-bit hexadecimal number


d. a cyclical redundancy check value

b. a 24-bit value that changes

Which is true about WEP?




a. must be at least 32 bits in length


b. uses a public/private key pair


c. uses a shared secret key


d. two keys are maintained

c. uses a shared secret key

Cleartext that has been encrypted is referred to as which of the following?




a. cryptography


b. ciphertext


c. plaintext


d. keytext

b. ciphertext

Searching for unprotected wireless networks is called what?




a. wireless fishing


b. war driving


c. battle testing


d. WLAN trolling

b. war driving

WEP guards one of the CIA characteristics, namely what?




a. integrity


b. availability


c. access control


d. confidentiality

d. confidentiality

Which type of access control is implemented by recording the physical address of a wireless client into software running on the AP?




a. NIC blocking


b. MAC address filtering


c. Network blocking


d. IP address filtering

b. MAC address filtering

Ann, a user, cannot access the company WiFi. She states that the WiFi signal is present and she has chosen the right SSID; however, each time Ann tries to access the network, she gets rejected. Which of the following is the BEST method to determine whether the mobile device is authorized to connect to the WiFi network?




Check if Ann is placed in the DMZ location of the company


Ensure the authentication server is up and running


Check the ACL for Ann's device MAC entry


Ensure the firewalls are all activated for that particular SSID

Check the ACL for Ann's device MAC entry

An attacker spoofs frames to prevent a client from remaining connected to the WLAN. What type of an attack is this?




a. RF jamming


b. man-in-the-middle


c. hijacking


d. denial of service

d. denial of service

Which of the following is the BEST way to mitigate risk associated with a BYOD deployment?




Content filtering


Virtualization


Containerization


WPA2

Containerization

An administrator is tasked with implementing disk encryption for information stored on a mobile device with at least 128-bits of strength. Which of the following should be applied to meet this requirement?




AES


SSL


SHA-1


DES

AES

An information security consultant has recommended that mobile devices for special agents use two-factor authentication. Which of the following would fulfill this requirement?




key fob and swipe card


pattern swipe and facial scan


fingerprint and retina scan


PIN and complex password

pattern swipe and facial scan

In case of loss or theft, which of the following methods is used to prevent corporate-based data being compromised?




access control list


password policy


firewall


full-disk encryption

full-disk encryption

Joe, a corporate MDM administrator, needs to implement device encryption. Which of the following would provide the BEST encryption?




data in transit encryption


block level device encryption


folder level device encryption


whole device encryption

whole device encryption

Which of the following encryption methods will be the BEST way to secure the company wireless network?




WAP


WPA-TKIP


WEP


WPA2-CCMP

WPA2-CCMP

Which of the following is MOST likely to be used by default for WPA2?




AES


TKIP


WEP


3DES

AES

Which of the following methods would MOST likely prevent a laptop from being booted without the correct key or password?




file-level encryption


full-disk encryption


folder level encryption


removable media encryption

full-disk encryption

Which of the following should MOST likely be used at corporate headquarters to secure transmission between a mobile device and a wireless access point?




VPN


SSL


WPA2


TLS

WPA2

Which of the following should be implemented when a personally owned mobile device is used to access business sensitive data, and the company is concerned with users extracting the company's sensitive data from the device?




device lock and remote wipe should be enforced on the personal device


a software container policy should wrap and encrypt both the user and company data


encryption should be enabled when company data is transmitted and received


a secure container device policy should separate company data from personal data

a secure container device policy should separate company data from personal data

Which of the following technologies allows secure communication with a previously unverified entity?




VPN


IMAP


TKIP


PKI

PKI

Which encryption protocol is used for 802.11i/WPA2?




a. CCMP


b. PSK


c. RSN


d. TKIP

d. TKIP

802.1X utilizes EAP. Which is a correct statement about EAP?




a. EAP uses two types of packets to perform authentication


b. EAP is one of the strongest encryption protocols


c. EAP is used by WEP2 to resolve some of WEP2’s weaknesses


d. EAP is a framework for transporting authentication protocol

d. EAP is a framework for transporting authentication protocol

Which of the following are used to secure data in transit? (Select 2)




IPsec


WPA


block level encryption


FTP


file level encryption

IPsec & WPA

Which of the following can be used to secure data at rest? (Select 2)




VPN


AES


SSL


3DES


IPsec

AES & 3DES

Which of the following are TKIP enhancement areas? (Select 2)




a. the IV is enhanced to effectively eliminate collisions


b. different keys are used for different types of traffic


c. a 40-bit encryption key is manually entered on APs and devices.


d. the required key length is increased to 128 bits

A, B, D

What three categories can the protections implemented in the original 802.11 standard be divided into? (Select 3)




a. authentication


b. MAC address filtering


c. wired equivalent privacy


d. access control

A, C, D

Which of the following are weaknesses of MAC address filtering? (Select 3)




a. only Windows uses MAC addresses, excluding other OSs from this method


b. MAC address management can be difficult


c. the MAC address can be captured by forcing a reassociation


d. MAC addresses can be spoofed

B, C, D