Mobility + Flashcards

Description

mobility + flashcards
Janet Ross Willi
Flashcards by Janet Ross Willi, updated more than 1 year ago
Janet Ross Willi
Created by Janet Ross Willi over 8 years ago
17
0

Resource summary

Question Answer
The two-factor authentication facial recognition and PIN
Help Desk Escalation steps Identify problem, document the issue, question the obvious
Mobile device mandate to stop internet gambling on your network Apply content filter
802.11G uses what frequency? 2.4ghz
Which of the following is topology for wireless access points Mesh
In order to conduct a predictive wireless audit (install wifi) Spectrum Analysis, Construction in the walls.
Mobile team is evaluating new smartphones for mass deployment considerations No API, Ability to set complex password.
Order of response in case of loss of device Confirm user identity, determine our policy response, report
If someone is reporting that the can not log into there phone (mdm) (password expires every 30 days) change your password
VPN= what port number? Port #4200
Celular technology supports voice and data at the same time GSM
How can be transmitted back through a mobile network? APN (access point name) = ssid
Mobile devices using mdm can communicate through a service using servers = ? network load balancing
Microsoft exchange active sync uses what port? https port 443
What entity preforms final testing of mobile devices before going public? mobile operator/carrier
Large scale mobile device deployment use a self service portal
valid placements to implement (mdm) SaaS, on premise(server locally) (software as a service)
mdm roll out process pilot test group, receive feed back, make the changes, receive our sign off, live.
on board mobile devices into mdm implement LDAP, use direct portal service. (ldap = server)
An enterprise application store Succcessfuly deploys in house applications
reviewing security incidents in a company list potential security list, whats out there
best option to deploy mobile ddevice mdm software SaaS
First thing to do after losing mobile device report the incident
If you have to sync a device be connected to the internet
Geofencing employees can not access data outside of their building
Admins responsibilty for emailing at work on a mobile device Create profile, set up active directory account.
Confidential emails are sent on? SSMTP secure simple mail transfer protocol
Final step in troubleshooting a mobile device document findings
Acceptable use policy Rules, Do and the dont's
Your company wants you to get on wifi, what do you need to know SSID, authentication method
Employees are using more data then they have on the plan mplement telecom expense management
What layer of the osi model uses mac address dATA
what layer of the osi model uses IP address network
6 comptia Troubleshooting steps Identify, Establish theory, make a plan of action execute plan verify it worked document
how do you secure data at rest AES, 3DES
How do you secure data in transit WPA, IPSec
Employee lost email access after an update what do you do Verify that others can not access their email
the best way to secure coorperate data from being compromised implement full disk encryption
What is the best method for access control on a mobile device PIN
Threats for mobile devices data loss, cloning
wireless assessment route access point, war pathing
encryption for data at rest aes
What is the best method for mobile network access control Certificate authentication
Best way to ensure that a fired employee can not get on the network using a mobile device remove certificate
To find out why the wifi is slow use spectrum analyzer
What is the best security method for wifi wpa2
Which is the best data encryption for cell phone ecc
umts belongs to what generation 3g
What cellular technology divides into 3 separate time slots? tdma (time devision multiple access)
Heavy snow absorption
Dynamically switching from tower with out dropping is called? roaming
employees phone won't send text and/or calls . why? network mode was changed
CEO is reporting latency on 3 devices wireless access points are over utilized
Which of the following are known as mobile device identifiers? ICCID (sim card) IMEI (serial#)
Joe is not receiving email on mobile device, everything else is working. what is wrong? look into mdm portal to see logs, check account status
What is the best way to renew an expired certificate remotely? Employee should delete all the policies on his device. Log into mdm server and reissue new certs
Transporting email SMTP
which of the following protocol secures reliable transport? TCP
Information reported for configuring devices is known as ..? SNMP (simple network managment protocol)
which port is used for relaying email on your computer port 25
How can you prevent a laptop from being booted without the correct key or password ? full disc encryption
What would prevent normal wireless communications when another device transmitted maliciously? jamming
An access point that is on a network without authorization rogue access point
Malicous software that trys to appear as something else trojan
Preventing usb flash drives from being utilized on any device can be accomplished by doing what? physical port disabling
increasing frequency the wave length gets longer? ?
When multiple signals arive at a certain location at the same time and disrupt each other? Interference
antena that goes 360 degree omni directional
radio wave bounces off something reflection
which of the following is required to connect to wifi? SSID
high availability procedures include which of the following load balancing
Show full summary Hide full summary

Similar

Project Communications Management
farzanajeffri
Common Technology Terms
Julio Aldine Branch-HCPL
Network Protocols
Shannon Anderson-Rush
Abstraction
Shannon Anderson-Rush
Computing
Kwame Oteng-Adusei
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Introduction to the Internet
Shannon Anderson-Rush
Construcción de software
CRHISTIAN SUAREZ
Historical Development of Computer Languages
Shannon Anderson-Rush
Useful String Methods
Shannon Anderson-Rush
Web Designing & Development Full Tutorial
Nandkishor Dhekane