Troy Flashcards

1
Q

___is a mobile service built specifically to perform for small businesses.

A

Comcast Business Mobile
PRD20002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CBM

A

Comcast Business Mobile
PRD20002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NCA

A

New Customer Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a customer that has neither a CB Mobile account nor a CB “core” account is called a what

A

A “new-new” customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ___ must reside within the Comcast footprint to qualify for Comcast Business Mobile however Comcast Business Mobile service also works outside of the Comcast footprint.

A

Account holder’s business location(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This Representative determines that they would like to establish Comcast Business Mobile service on behalf of their business

A

Approved Business Representative (ABR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ABR

A

Approved Business Representative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a cloud internet security product offering small to medium business customers a way to protect their businesses by customizing
internet experiences at their sites

A

Security Edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS queries are redirected to this server.

A

Akamai

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name 3 common types of cyber threats

A

Malware, Botnet, Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Botnet is formed from these two words

A

Robot and network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Software that is malicious and is intended to damage or disable computers and computer systems.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How often is the SecurityEdge server updated to stay current on the latest threats

A

every 5 mins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Collecting sensitive information and is often sent to unsuspecting
individuals in an email

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Most common deployed cyber threat

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security edge doesn’t protect against the following (6)

A

Inbound traffic, email, vpn, Open inbound ports, EOL software,
Vulnerability attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Access to SecurityEdge portal through My account portal may
take up to how long to update

A

5 hrs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the url link to confirm if security edge is active

A

Blockme.now

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

enables you to set custom web filters to enforce internet access
policy across your internal network

A

Security Edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

allows users to manage their interent traffic using preset protection level categories and scheduling

A

Web filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

remote devices that are away from the business location and
customize security policies for multiple user profile groups

A

Extended Coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Security edge extended coverage allows subscribers to manage
up to how many separate user profiles

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Activation links expire in how many days

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

average down time due to ransomware attack

A

21 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

a general purpose profile for all new and unrecognized devices

A

Default profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

a profile for recognized devices used by member of your organization

A

employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Extended coverage will support up to how many remote devices

A

250

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Web filters have these 5 different settings

A

none, light, medium, strict, custom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Security edge scheduled reports in these 4 frequency intervals

A

Never, daily, weekly, Monthly

30
Q

allows users to block all non-administrative related internet access.

A

Internet Of

31
Q

allows users to manage their internet traffic using preset Protection Level categories and Content Restriction Scheduling

A

Web filters

32
Q

This page can be used to search specific website URLs to determine if they are included on any of the Web Filters applied in
Protection Levels.

A

Domain Lookup

33
Q

Malware is a short term for this

A

Malicious software

34
Q

These are command and control infections

A

Botnet

35
Q

List the 5 types of malware

A

viruses, worms, trojans, ransomware, spyware

36
Q

DDoS

A

Distributed Denial of Service

37
Q

DNS

A

Domain Name Server

38
Q

This app is used to protect devices away from the business

A

SecurityEdge App

39
Q

What are the profile types in SecurityEdge extended coverage

A

Default and Employees

40
Q

Akamai processes how many DNS queries daily

A

4 trillion

41
Q

Security edge email reports on these 3 intervals

A

Daily, weekly, monthly

42
Q

network of hijacked zombie computer remotely managed

A

Botnet

43
Q

Security Edge “Welcome Email” will show detailed instructions on
these three configurations

A

Web Filtering, Email reports, Custom Block pages

44
Q

Collecting sensitive information: login credentials and credit card
information through a legitmate-looking website

A

Phishing

45
Q

How to verify Security Edge is active

A

Tech360 PHT

46
Q

Security Edge these 3 protections are enabled by default

A

Malware, phishing, Botnet

47
Q

Enter a domain name and see what category it’s in

A

Domain Lookup

48
Q

Security Edge Off-Hours internet schedule blocks all internet traffic except these 3 things

A

access to MyAccount, CB products, Smart office

49
Q

SecurityEdge section provides the ability to customize the browser message received when a user attempts to access a website
or page that is blocked

A

Block Page Customization

50
Q

CB Mobile currently offers what types of devices?

A

Apple, Motorola, Samsung, and Google

51
Q

The six popular aspects of a phone that influence CB Mobile customers when buying new devices

A

Memory, Color, Screen size, Camera, Price, and Brand

52
Q

BYOD

A

Bring Your Own Device

53
Q

How do you factory reset an XH doorbell?

A

Hold reset for 10 seconds

54
Q

How do you do a standard reset on an XH doorbell?

A

Hit and immediately release.

55
Q

IEEE Zigbee standard.

A

802.15.4

56
Q

IR Range for doorbell?

A

16’

57
Q

Diagonal FOV for doorbells.

A

155 Degrees

58
Q

Horizontal FOV for doorbells.

A

132 Degrees

59
Q

Vertical FOV for doorbells.

A

98 Degrees

60
Q

Operating temp for doorbells.

A

-5 to 120 degrees

61
Q

Resolution on doorbells for live feed.

A

1920x1440

62
Q

Resolution on doorbells for 24/7 recordings.

A

1280x960

63
Q

Required speed to install at location for doorbells.

A

3/2 Mbps

64
Q

Maximum distance on power adaptor.

A

30’

65
Q

Minimum required voltage for doorbells.

A

16-30 VAC

66
Q

Waterproof rating for XH doorbells.

A

55 IP

67
Q

What should be used to make mount flush and/or fill in gaps between mount and mounting surface?

A

Duct Seal

67
Q

Bluetooth used by XH doorbell.

A

Bluetooth low energy 5.0

68
Q

WiFi used by XH doorbells.

A

802.11 b/g/n/ac Dual Band

69
Q
A