Erstellt von Janet Ross Willi
vor fast 9 Jahre
|
||
Frage | Antworten |
The two-factor authentication | facial recognition and PIN |
Help Desk Escalation steps | Identify problem, document the issue, question the obvious |
Mobile device mandate to stop internet gambling on your network | Apply content filter |
802.11G uses what frequency? | 2.4ghz |
Which of the following is topology for wireless access points | Mesh |
In order to conduct a predictive wireless audit (install wifi) | Spectrum Analysis, Construction in the walls. |
Mobile team is evaluating new smartphones for mass deployment considerations | No API, Ability to set complex password. |
Order of response in case of loss of device | Confirm user identity, determine our policy response, report |
If someone is reporting that the can not log into there phone (mdm) (password expires every 30 days) | change your password |
VPN= what port number? | Port #4200 |
Celular technology supports voice and data at the same time | GSM |
How can be transmitted back through a mobile network? | APN (access point name) = ssid |
Mobile devices using mdm can communicate through a service using servers = ? | network load balancing |
Microsoft exchange active sync uses what port? | https port 443 |
What entity preforms final testing of mobile devices before going public? | mobile operator/carrier |
Large scale mobile device deployment | use a self service portal |
valid placements to implement (mdm) | SaaS, on premise(server locally) (software as a service) |
mdm roll out process | pilot test group, receive feed back, make the changes, receive our sign off, live. |
on board mobile devices into mdm | implement LDAP, use direct portal service. (ldap = server) |
An enterprise application store | Succcessfuly deploys in house applications |
reviewing security incidents in a company | list potential security list, whats out there |
best option to deploy mobile ddevice mdm software | SaaS |
First thing to do after losing mobile device | report the incident |
If you have to sync a device | be connected to the internet |
Geofencing | employees can not access data outside of their building |
Admins responsibilty for emailing at work on a mobile device | Create profile, set up active directory account. |
Confidential emails are sent on? | SSMTP secure simple mail transfer protocol |
Final step in troubleshooting a mobile device | document findings |
Acceptable use policy | Rules, Do and the dont's |
Your company wants you to get on wifi, what do you need to know | SSID, authentication method |
Employees are using more data then they have on the plan | mplement telecom expense management |
What layer of the osi model uses mac address | dATA |
what layer of the osi model uses IP address | network |
6 comptia Troubleshooting steps | Identify, Establish theory, make a plan of action execute plan verify it worked document |
how do you secure data at rest | AES, 3DES |
How do you secure data in transit | WPA, IPSec |
Employee lost email access after an update what do you do | Verify that others can not access their email |
the best way to secure coorperate data from being compromised | implement full disk encryption |
What is the best method for access control on a mobile device | PIN |
Threats for mobile devices | data loss, cloning |
wireless assessment | route access point, war pathing |
encryption for data at rest | aes |
What is the best method for mobile network access control | Certificate authentication |
Best way to ensure that a fired employee can not get on the network using a mobile device | remove certificate |
To find out why the wifi is slow | use spectrum analyzer |
What is the best security method for wifi | wpa2 |
Which is the best data encryption for cell phone | ecc |
umts belongs to what generation | 3g |
What cellular technology divides into 3 separate time slots? | tdma (time devision multiple access) |
Heavy snow | absorption |
Dynamically switching from tower with out dropping is called? | roaming |
employees phone won't send text and/or calls . why? | network mode was changed |
CEO is reporting latency on 3 devices | wireless access points are over utilized |
Which of the following are known as mobile device identifiers? | ICCID (sim card) IMEI (serial#) |
Joe is not receiving email on mobile device, everything else is working. what is wrong? | look into mdm portal to see logs, check account status |
What is the best way to renew an expired certificate remotely? | Employee should delete all the policies on his device. Log into mdm server and reissue new certs |
Transporting email | SMTP |
which of the following protocol secures reliable transport? | TCP |
Information reported for configuring devices is known as ..? | SNMP (simple network managment protocol) |
which port is used for relaying email on your computer | port 25 |
How can you prevent a laptop from being booted without the correct key or password ? | full disc encryption |
What would prevent normal wireless communications when another device transmitted maliciously? | jamming |
An access point that is on a network without authorization | rogue access point |
Malicous software that trys to appear as something else | trojan |
Preventing usb flash drives from being utilized on any device can be accomplished by doing what? | physical port disabling |
increasing frequency the wave length gets longer? | ? |
When multiple signals arive at a certain location at the same time and disrupt each other? | Interference |
antena that goes 360 degree | omni directional |
radio wave bounces off something | reflection |
which of the following is required to connect to wifi? | SSID |
high availability procedures include which of the following | load balancing |
Möchten Sie mit GoConqr kostenlos Ihre eigenen Karteikarten erstellen? Mehr erfahren.