Chapter 12 Flashcards
Which technology is the most common to connect to a wireless network for a corporation that allows a data rate up to 54 MB/sec?
- 11a
- 11b
- 11g
- 11n
802.11g
Which tool set is designed specifically for mobile PCs?
Computer Management console
Mobile Management console
Windows Mobility Center
Computer Information Center
Windows Mobility Center
What bundles together the configuration settings that users most often use when giving a presentation into a single switch?
Mobility on the Go
Presentation Settings
Mobile Show
Mobile Display
Presentation Settings
What technology is used to configure power settings using the graphical control panel?
APM
ACPI
PIM
PS
ACPI
What component is used to ensure that all clients meet a minimum set of criteria such as up-to-date anti-virus protection and Windows updates?
VPN Reconnect
Network Access Protection
Remote App
Direct Access
Network Access Protection
_______________ enables remote users to automatically connect to the computer network whenever they have Internet access.
DirectAccess
BranchCache
Remote App
Network Access Protection
DirectAccess
Which wireless technology is considered a weak encryption protocol?
802.1x
WEP
WPA
WPA2
WEP
What replaced ActiveSync to synchronize data files, email, appointments, and contact information with the mobile devices?
Partner Sync Center
Sync Center
Windows Mobile Device Center
BitLocker
Windows Mobile Device Center
the ability to configure all power settings in three ways, using graphical control panel settings, Group Policy, or the command prompt.
Advanced Configuration and Power Interface (ACPI)
Implemented in the WPA2 standard, AES uses a different and more secure encryption algorithm, called CCMP. However, while it is possible to upgrade some legacy WEP equipment to support WPA‐TKIP, most equipment cannot be upgraded to support AES. As a result, a wireless network will probably not be able to use AES encryption unless the organization chooses equipment that specifically supports it.
Advanced Encryption System (AES)
a feature, first released in Windows Vista and now available in the Windows 7 Enterprise and Ultimate editions, that makes it possible to encrypt an entire volume.
BitLocker Drive Encryption
a user account that an administrator has authorized to recover BitLocker drives for an entire organization with a digital certificate on a smart card.
data recovery agent (DRA)
enabling clients to remain connected to their host networks whenever they have access to the Internet, reconnecting automatically whenever it is necessary.
DirectAccess
dictate the frequencies, transmission speeds, and ranges of wireless networking products.
IEEE 802.11
enables a computer to reconnect to a VPN server automatically, after an interruption as long as eight hours. VPN only works with connections that use the IKEv2 protocol, which means that the client must be running Windows 7 and the remote access server must be running Windows Server 2008 R2.
IKEv2 Mobility and Multihoming (MOBIKE)
standards publisher
Institute of Electrical and Electronic Engineers (IEEE)
New in Windows 7 and Windows Server 2008 R2, IKEv2 uses TCP port 500 and provides support for IPv6 and the new VPN Reconnect feature, as well as authentication by EAP, using PEAP, EAP‐MSCHAPv2, or smart cards.
Internet Key Exchange, Version 2 (IKEv2)