A+ 902 Test 14 Flashcards

1
Q

Personal Area Network (PAN) over Bluetooth is known as:

A

Piconet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following answers refers to a security feature used in Bluetooth device pairing?

A

PIN code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

obile device email configuration settings required for retrieval of messages from a mail server include:

A

IMAP

POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the answers listed below refer(s) to POP3S encrypted communication?

A

Secure Sockets Layer (SSL)
TCP port 995
Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the characteristic features of the secure version of IMAP?

A

Secure Sockets Layer (SSL)
TCP port 993
Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the name of an email server software product developed by Microsoft?

A

Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multipurpose Internet Mail Extensions (MIME) specification extends the email message format beyond simple text enabling the transfer of graphics, audio, and video files over the Internet mail system.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

hich of the following answers refer to S/MIME?

A

Digital signatures

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the answers listed below refers to the default configuration settings a mobile device is shipped with?

A

PRI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of moving from one Wireless Access Point (WAP) coverage area to another without re-authentication or loss in connectivity is commonly referred to as

A

Roaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection with the right cell phone tower is called:

A

PRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following answers refers to a unique number used for identification of a physical mobile device?

A

IMEI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A unique number used for identification of a mobile network phone user is known as:

A

IMSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile device synchronization methods for Apple iOS devices include:

A

iTunes

iCloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login at only one of the components is commonly referred to as:

A

Single Sign-On (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

A

Malware

17
Q

Malicious software collecting information about users without their knowledge/consent is known as:

A

Spyware

18
Q

A computer program containing malicious segment that attaches itself to an application program or other executable component is called:

A

Virus

19
Q

A standalone malicious computer program that replicates itself over a computer network is known as:

A

Worm

20
Q

Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is called:

A

Trojan horse

21
Q

A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

A

Rootkit

22
Q

Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?

A

Backdoor

23
Q

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

A

Ransomware

24
Q

A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:

A

Phishing

25
Q

A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of:

A

Phishing

Social engineering