CDS 444

¡Supera tus tareas y exámenes ahora con Quizwiz!

True or False? In cellular design, if each cell uses different frequencies, users in two different cells on the same channel interfere with each other

False

True or false? A semi directional antenna is typically installed by default on wireless access points (WAPs) and radiates radio waves equally in all directions

False

True or false? A thin access point has a switch like intelligence

False

True or false? the Institute of electrical and electronics engineers (IEEE) is the U.S. regulatory body in charge of telecommunication rules

False

true or false? the institute of electrical and electronics engineers (IEEE) created the standards that specify the frequency band, the spectrum, the transmission power regulations, and various other characteristics of the ISM wireless band

False

Several advancements in cellular technology improve bandwidth and capacity to handle simultaneous calls. Which breakthrough 3G technology first supported streaming music and video on cellular devices?

High Speed Downlink Packet Access (HSDPA)

Which of the following best describes Frequency Division Multiple Access (FDMA)?

The frequency spectrum is divided among users

which of the following is not true of 802.11 unlicensed bands?

Those who use unlicensed bands have exclusive use of the bands

Which method of frequency sharing in a cellular network depends on "empty space" on the channel when both participants in a voice conversation are silent

Time Division Multiple Access (TDMA)

True or false? Because code division multiple access (CDMA) has multiple signals on the same frequency, the near far problem creates a frequency jam

True

True or false? In cellular communications, picocells are needed for dense urban areas

True

True or false? Multi-user MIMO (MU-MIMO) technology enables more than one client to communicate over the bandwidth spectrum at a given time

True

True or false? the Bluetooth protocol is defined at layer 1 in the OSI reference model

True

true or false? a piconet is a grouping of paired Bluetooth devices that form dynamically as devices enter or leave radio proximity

True

true or false? authorization is the process of validating a claimed identity, whether the identity is for a user, device, or application

false

A native mobile app:

has direct access to the device's sensors

which of the following is not a characteristic of the first generation cellular phones in the 1990s

Dense coverage

Which of the following best describes defense in depth?

Deploying multiple forms of security to reduce the risk of deep penetration from unauthorized users

The two systems deployed for which technology are Mobile Worldwide Interoperability for Microwave Access (WiMAX) and long-term evolution (LTE)

4G

using a zero trust security strategy, many security tasks can be outsourced to a cloud provider. For mobile devices, which of the following is typically not outsourced

ensuring data on the user's device is stored securely

True or False? A mobile cloud app is installed and runs directly on a mobile device

false

True or False? in cellular design, micro cells are needed for rural areas

false

Which two layers of the Open systems interconnection (OSI) Reference model are closely associated due to the use of transmission control protocol/internet protocol (TCP/IP)

Network and transport layer (Layers 3 and 4)

Roger works in the accounting department of a mid-sized company. He was recently suspected of accessing confidential human resources files to which he has no authority to view. Roger denies doing so, but they cybersecurity officer provides proof of Rodger's actions. What is this an example of?

Nonrepudiation

When performing a wireless site survey, which part of the survey enables you to visualize and map the radio frequency (RF) activity that already exists within the 2.4 and 5.0 GHz spectrums

Spectrum Analysis

Which of the following can be used to connect wireless access points (WAPs) to form a wireless backbone? To do this successfully, the WAP needs to have two separate transmitter/receiver channels

Wireless distribution systems (WDS)

Which of the following is not an example of personally identifiable information (PII)

A list of passwords

Which service set for Wi-Fi devices is the cornerstone of wireless networks, defines a common topology, is typically connected to a distribution network such as an Ethernet LAN, and moves all communication through the access point?

Basic service set (BSS)

Which of the following is a type of mobile device control attack?

Bluetooth Wi-Fi hack

Common threats, such as browser exploits, snooping, radio-based communications, and stolen devices, fall under what type of threat?

Data theft threats

Which of the following is not an example of Internet of Things (IoT) electronics

Extension Cords

Which of the following is a feature of the Internet Protocol version 4 (IPv4)

Four octets

Mobile IP handles the change of IP address and maintains current sessions by using certain Mobile IP client stack specific components. Among these, which device changes its point of attachment from one subnet or network to another?

Mobile Node

Which regulatory standard was enacted to address investor confidence and corporate financial fraud through reporting standards for public companies

Sarbanes-Oxley Act (SOX)

True or False? Security is a concern for both mobile cloud apps and native mobile apps

true

The increased usage of fax machines is an example of what?

The network effect

The naming of generations of wireless technologies as "xG" began with which version?

3G

WLAN operates at which IEEE 802 standard?

802.11

For the past year or so, the ABC Hi-Tech store has advertised it is selling Wi-Fi 6 compatible access points. to what 802.11 standard does this product map?

802.11ax

of the following, which best describes circuit switching?

A physical connection made between two phones

From a developer's point of view, low development costs plus easy access to what make mobile app development profitable

Software development kits (SDKs)

What began as the result of a U.S. government project and is the predecessor of the internet

ARPANET

Which of the following is most responsible for the use of the hexagonal (Six-sided cell design of cellular coverage maps?

Cell Phone Transmission Power

Which of the following makes it possible for several mobile users to share multiple frequency bands at the same time by spreading the signal out over the frequencies? because it relies on lower powered signals, however, it suffers from the "near-far" problem

Code Division Multiple Access (CDMA)

This principle of information security that applies to both the privacy of information (protecting data from being seen) and its secrecy (hiding knowledge of data's existence or whereabouts) is:

Confidentiality

Which of the following wireless topologies uses seamless roaming, nomadic roaming, and collocation

Extended service set (ESS)

Lin is a wireless network engineer. She is performing a spectrum and protocol analysis on a branch office prior to implementing a wireless LAN (WLAN) Solution. She is currently concerned with microwave ovens, cordless phones, fluorescent bulbs, and Bluetooth radios. Which of the following is she addressing

Sources of noise and interference

True or False? the primary use case for vSAT is in home automation scenarios for products such as smart lighting and thermostat controllers and sensors

False

True or false? Bluetooth is suitable for wireless sensor network (WSN) nodes due to its ability to form an infrastructure network

False

true or false? "rooting" modifies the apple IOS to allow unsigned code to run on apple devices

False

A local cellular provider upgrades from 3G to 4G. Security experts and critical have n=known concerns about diameter, the signaling protocol used in 4G. What might be a potential impact from those concerns

Identity theft of the device's user

Of the following, which has a 128-bit address scheme

Internet Protocol Version 6 (IPv6)

Which of the following is true of the cellular handover process?

It ensures that subscribers can pass out of the range of one transmitter and into the area of another without losing the connection

Which of the following is not true of how a wireless access point (WAP) works?

It transmits beacons once per minute on the selected radio frequency (RF) band and channel to advertise its presence and configuration

An inherent issue with radio waves is that they reflect off certain materials and surfaces. This results in multiple versions of the same radio waves bouncing around known as:

Multipath

Which of the following is a method of increasing the data rate by dividing the available spectrum into smaller units, which makes better use of the available transmission frequencies within the 2.4 GHz and 5 GHz bands?

Orthogonal Frequency-division multiple access (OFDMA)

What has recently claimed a dominant position in networking, in part due to the addition of features such as power over ethernet (PoE) and improved speeds from 1 gigabit (Gb) to 40 Gb and even over 100 GB ethernet

Switching

True or False? Internet Protocol (IP) addressing enables a network to correctly route packets across a network

True

True or False? Regarding the Open System Interconnection (OSI) Reference Model, many people combine layers 5 through 7, referring to them as the "Application layer"

True

True or False? the Internet of things (IoT) has long been available through wired networks

True

True or false? A hash is most often associated with the integrity principle of information security

True

True or false? because a mobile device could well be shared by many authorized users, it is imperative to authenticate not just the user, but also the device

True

True or false? in mobile communications cellular design, each cell has its own antenna tower

True

Employees bringing and using their own devices at work is increasingly common. Advanced technology permits specific authorization when users use their own devices. A context-aware firewall grants the administrator special granularity compared to other firewalls, allowing rules to prevent:

User access outside of normal work hours

Which of the following is an alternative last-mile solution to carrier network's long term evolution (LTE) and digital subscriber line (DSL) networks because it is a high speed RF microwave technology that provides up to 1 Gbps bandwidth

WiMAX

which of the following is optimized for reliable and low latency communication of small data packets and is impervious to interference from Wi-Fi and other wireless technologies in the 2.4 Ghz range

Z wave

Which of the following is a security approach that considers internal and external networks to be completely untrusted

Zero Trust

Authorization is described as:

a process that works in conjunction with another method to grant access rights to a user, group, system, or application

The principle of information security that refers to the assurance that information is genuine, that it remains true to its original form, and that it has not been manipulated or tampered with is:

integrity

Which breakthrough technology first allowed users to switch phones without carrier involvement

the subscriber identity module (SIM) card

Which cellular network first used network authentication, which ensured that users connected to the correct network

3G

Dwayne is an innovator and inventor developing a product that is going to use the ISM band. He has obtained all of the necessary government permits. His product will be using the same bandwidth as Wi-Fi, Bluetooth, and radio-frequency identification (RFID). What is that bandwidth

2.4 GHz

What technology is most closely associated with augmented reality and virtual reality (AR and VR) mobile gamming?

5G

Which wireless standard was one of the earlier enablers of low-power network devices and can be used with 6LoWPAN

802.15.4

The first step in formulating blank is to ask questions such as "what constraints prevent you from protecting an asset?" and "is broad access required?"

A security plan

Which of the following contains eight fields of four-digit hexadecimal (base 16) numbers (0 to 9 and a to f)

An internet protocol version 6 (IPv6) Address

The principle of information security that is concerned with ensuring that systems and services are not withheld from users by unauthorized means is

Availability

Which of the following are laser wireless broadband wide area network (WAN) links that have a range of 3-5 kilometers line-of-sight and a throughput of 10 Gbps

Free Space Optics (FSO)

the first technology employing packet-switching, which allowed data sharing over mobile networks, was

GPRS

which of the following best illustrates the Network layer of the open systems and interconnection (OSI) reference Model?

Gerald is setting up a small home/office network for a friend. the network is both wired and wireless and he is configuring IPv4 addressing for each device

After experiencing many Ethernet network outages, a company decides to implement a wireless workgroup bridge as a backup. Which of the following is true of this solution?

It works well because the wired PCs continue to communicate with each other over the wireless bridge connection after a router or switch fails

Most companies employ a practice whereby personnel are given the rights and permissions to perform their jobs and nothing more. this is called?

Least privilege

Mahko is the cybersecurity expert for his company. The company has told employees that they must use their personal devices for business purposes in order to save money. However, Mahko struggles with how some staff members use their personal devices on their own time. He is concerned they do not meet the company's acceptable use standards. Which vulnerability is most important for Mahko to address?

Legal separation between personal and business use

Which low power wide area network (WAN) technology has a "star of stars" topology, whereby end node devices connect through gateways to network servers?

Long range wide area network (LoRaWAN)

Which of the following is another name for Wi-Fi 802.11ah, a standard for low-power wide area network (WAN) technology

Low power WiFi (HaLow)

Casey is installing a group of antennas for a wireless network. All of the antennas need to be tilted away from each other to introduce a measure of delay between the individual antenna radio signals. what type of antenna is he installing

MIMO antenna

Which layer of the Open Systems Interconnection (OSI) reference model handles communication paths between local area networks (LANS)? Internet Protocol (IP) exists at this layer as well

Network Layer

Which layer of the Open System Interconnection (OSI) Reference Model represents the signal path over which data is transmitted? This can include copper wires; optical fibers; or radio signals, such as Wi-Fi, WiMAX, and Bluetooth

Physical Layer

Carl is setting up a wireless network for his sister's family that will not require the use of a wireless access point (WAP). In this ad hoc network, each wireless network node must transmit a beacon that includes a timestamp for synchronization timing, the channel, the data rate, spread spectrum parameters, the SSID, and what else?

Quality of service (QoS) parameters

which low power wide are network (WAN) technology is an end to end system consisting of the presence of a certified modem at one end and a web based application at the other end

Sigfox

Which of the following was created to solve frequency interference problems with early cellular coverage map design?

Splitting up or segmenting frequencies

The Open System Interconnection (OSI) Reference Model defines seven layers that are collectively referred to as a:

Stack

A company recently installed a state of the art wireless system in a large building. However, the company is experiencing outages and blind spots throughout the building. Which of the following is a fix to the wireless problems

Tune wireless access points (WAPs) to operate on different channels

Which of the following consists of many wireless nodes connected as a local mesh or star configuration that cover a local area

Wireless sensor network (WSN)

while there is no "one size fits all" solution for all internet of things (IoT) technologies, which of the following would be the most likely technology solution for a smart building network that monitors internal environmental conditions

Wireless sensor network (WSN)

Which of the following takes advantage of its higher autonomous application and security layers to add support for 6LoWPAN and RPL (Routing Protocol for Low-Power and Lossy Networks) that optimize meshing and IP routing for wireless sensor networks?

Zigbee IP

True or false? with least privilege, unauthorized users would have to breach several forms of security to reach an intended target.

false

Which low power wide are network (WAN technology is highly susceptible to objects in its line of sight path and atmospheric conditions, such as light rain? In adverse conditions, this technology requires a high power boost to overcome the rain fade margin and that would rule it out for most internet of things (IoT) purposes

millimeter radio

Which of the following sends over the air signals to mobile devices to distribute configuration setting and provides a central point of control and policy

mobile device management (MDM)

True oor false? ISM is short for the industrial, scientific, and medical band of the unlicensed wireless spectrum

true


Conjuntos de estudio relacionados

Med-surg Ch. 48 (acute inflammatory intestinal disorders):

View Set

Med surg 2 test practice questions (exam 1, neuro)

View Set