Test 15 Flashcards

1
Q

Which of the terms listed below is used to describe a foundational level of security configurations and settings required to safeguard a system?

A

Secure baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Installing mobile apps from trusted sources (e.g., Apple’s App Store for iOS devices, or Google Play for Android devices) instead of third-party application stores decreases malware-related security risks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data on a lost or stolen mobile device can be erased by:

A

Remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following answers refers to a mobile security solution that enables separate controls over the user and enterprise data?

A

Storage segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Implementing full device encryption is one of the methods for securing sensitive data on a smartphone. When enabled, this type of encryption works in conjunction with the phone’s screen lock, i.e., to decrypt the phone (which stays encrypted whenever the phone is locked), a user must first unlock the screen. On Android devices, the unlocking methods include entering a PIN, password, or drawing a simple pattern with a finger. Apple devices use passcodes, facial recognition (Face ID), and fingerprint (Touch ID).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the context of MDM, the isolation of corporate applications and data from other parts of the mobile device is referred to as:

A

Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the answers listed below refer to workstation hardening techniques? (Select 3 answers)

A

Regularly applying security patches and updates to the OS and installed software
Removing or disabling unnecessary drivers, services, software, and network protocols ( Missed)
Limiting unauthorized or unauthenticated user access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following answers refer(s) to (a) router hardening technique(s)? (Select all that apply)

A

Changing default credentials ( Missed)
Disabling unused services and ports
Implementing regular firmware updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the answers listed below refers to the process of assessing the physical environment, such as the layout of the building, to identify potential sources of interference and determine the optimal placement of a WAP?

A

Site survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An administrator needs to adjust the placement of multiple APs to ensure the best wireless signal coverage for the network. Which of the following would be of help in identifying areas of low signal strength?

A

Heat map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of software enables centralized administration of mobile devices?

A

MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refers to software that facilitates the enforcement of mobile device policies and procedures?

A

MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A mobile device deployment model that allows employees to use private mobile devices for accessing company’s restricted data and applications is known as:

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the answers listed below refers to a mobile device deployment model where organizations provide and own the devices while allowing their personal use?

A

COPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name of a mobile device deployment model in which employees select devices for work-related tasks from a company-approved device list?

A

CYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An SSID is a unique identifier (a.k.a. wireless network name) for a WLAN. Wireless networks advertise their presence by regularly broadcasting SSID in a special packet called beacon frame. In wireless networks with disabled security features, knowing the network SSID is enough to get access to the network. SSID also pinpoints the wireless router that acts as a WAP. Wireless routers from the same manufacturer are frequently configured with default (well-known) SSID names. Since multiple devices with the same SSID displayed on the list of available networks create confusion and encourage accidental access by unauthorized users (applies to networks that lack security), changing the default SSID is a recommended practice.

A

True

17
Q

For a wireless client to be able to connect to a network, the security type (e.g., WEP, WPA, WPA2, or WPA3) and encryption type (e.g., TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a WAP.

A

True

18
Q

Which of the following answers refers to a security feature used in Bluetooth device pairing?

A

PIN

19
Q

Which of the following solutions would offer the strongest security for a small network that lacks an authentication server?

A

WPA3-SAE

20
Q

What are the characteristic features of WPA2/WPA3 Enterprise mode? (Select 3 answers)

A

Suitable for large corporate networks
IEEE 802.1X
Requires RADIUS authentication server

21
Q

What is the name of the encryption protocol primarily used in Wi-Fi networks implementing the WPA3 security standard?

A

AES-GCMP

22
Q

Which of the following acronyms refers to a client authentication method used in WPA3 Personal mode?

A

SAE

23
Q

What are the characteristics of TACACS+? (Select 3 answers)

A

Encrypts the entire payload of the access-request packet ( Missed)
Primarily used for device administration ( Missed)
Separates authentication and authorization

24
Q

What are the characteristic features of RADIUS? (Select 3 answers)

A

Combines authentication and authorization ( Missed)
Encrypts only the password in the access-request packet
Primarily used for network access

25
Q

Which of the wireless encryption schemes listed below offers the highest level of protection?

A

WPA3