Which of the following attacks would cause all mobile devices to lose their association with corporate access points while the attack is underway?
A. Wireless jamming
B. Evil twin
C. Rogue AP
D. Packet sniffing
CompTIA exam questions
Which of the following attacks would cause all mobile devices to lose their association with corporate access points while the attack is underway?
A. Wireless jamming
B. Evil twin
C. Rogue AP
D. Packet sniffing
Which of the following types of cryptography should be used when minimal overhead is necessary for a mobile device?
A. Block cipher
B. Elliptical curve cryptography
C. Diffie-Hellman algorithm
D. Stream cipher
A Security administrator wants to implement strong security on the company smart phones and terminal servers located in the data center. Drag and Drop the applicable controls to each asset type.
Instructions: Controls can be used multiple times and not all placeholders needs to be filled. When you have completed the simulation, Please select Done to submit.
A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. Which of the following is the malicious student implementing?
A. Removing the AP from the classroom
B. ACL
C. Jamming
D. Firewall
E. IPS
Which of the following technologies can be used to secure mobile devices and their data? (Select TWO).
A. Protective screen
B. Remote wipe
C. Physical lock
D. Locator
E. Passcode lock
Which of the following allows a hidden backdoor to be used for access to workstations on the Internet?
A. Firmware
B. Rootkits
C. SQL injection
D. Cross-side scripting
Which of the following can a technician implement to ensure that only company owned mobile devices can connect to the wireless network?
A. Deploy a script to auto-configure employees mobile devices wireless settings.
B. Configure MAC address filtering on the access points.
C. Implement a wireless policy and train all users.
D. Enable WPA2-Personal with a strong password.
Which of the following methods of securing mobile devices will prevent data loss due to corruption?
A. Enforce pass code locks
B. Install location monitoring application
C. Perform remote wipe after failed login
D. Perform remote application back-up
Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO).
A. Unauthorized downloads
B. Viruses
C. Improper file permissions
D. Phishing
E. Theft
Which of the following is the BEST option to prevent data breaches on lost mobile devices?
A. Install a locator application on the mobile device so that it can be traced.
B. Apply a restriction to lock the device after a certain number of failed login attempts.
C. Configure the device to remote wipe as soon as it is reported lost.
D. Utilize the fingerprint scanner and passcode for multifactor authentication.