CDS 444
True or False? In cellular design, if each cell uses different frequencies, users in two different cells on the same channel interfere with each other
False
True or false? A semi directional antenna is typically installed by default on wireless access points (WAPs) and radiates radio waves equally in all directions
False
True or false? A thin access point has a switch like intelligence
False
True or false? the Institute of electrical and electronics engineers (IEEE) is the U.S. regulatory body in charge of telecommunication rules
False
true or false? the institute of electrical and electronics engineers (IEEE) created the standards that specify the frequency band, the spectrum, the transmission power regulations, and various other characteristics of the ISM wireless band
False
Several advancements in cellular technology improve bandwidth and capacity to handle simultaneous calls. Which breakthrough 3G technology first supported streaming music and video on cellular devices?
High Speed Downlink Packet Access (HSDPA)
Which of the following best describes Frequency Division Multiple Access (FDMA)?
The frequency spectrum is divided among users
which of the following is not true of 802.11 unlicensed bands?
Those who use unlicensed bands have exclusive use of the bands
Which method of frequency sharing in a cellular network depends on "empty space" on the channel when both participants in a voice conversation are silent
Time Division Multiple Access (TDMA)
True or false? Because code division multiple access (CDMA) has multiple signals on the same frequency, the near far problem creates a frequency jam
True
True or false? In cellular communications, picocells are needed for dense urban areas
True
True or false? Multi-user MIMO (MU-MIMO) technology enables more than one client to communicate over the bandwidth spectrum at a given time
True
True or false? the Bluetooth protocol is defined at layer 1 in the OSI reference model
True
true or false? a piconet is a grouping of paired Bluetooth devices that form dynamically as devices enter or leave radio proximity
True
true or false? authorization is the process of validating a claimed identity, whether the identity is for a user, device, or application
false
A native mobile app:
has direct access to the device's sensors
which of the following is not a characteristic of the first generation cellular phones in the 1990s
Dense coverage
Which of the following best describes defense in depth?
Deploying multiple forms of security to reduce the risk of deep penetration from unauthorized users
The two systems deployed for which technology are Mobile Worldwide Interoperability for Microwave Access (WiMAX) and long-term evolution (LTE)
4G
using a zero trust security strategy, many security tasks can be outsourced to a cloud provider. For mobile devices, which of the following is typically not outsourced
ensuring data on the user's device is stored securely
True or False? A mobile cloud app is installed and runs directly on a mobile device
false
True or False? in cellular design, micro cells are needed for rural areas
false
Which two layers of the Open systems interconnection (OSI) Reference model are closely associated due to the use of transmission control protocol/internet protocol (TCP/IP)
Network and transport layer (Layers 3 and 4)
Roger works in the accounting department of a mid-sized company. He was recently suspected of accessing confidential human resources files to which he has no authority to view. Roger denies doing so, but they cybersecurity officer provides proof of Rodger's actions. What is this an example of?
Nonrepudiation
When performing a wireless site survey, which part of the survey enables you to visualize and map the radio frequency (RF) activity that already exists within the 2.4 and 5.0 GHz spectrums
Spectrum Analysis
Which of the following can be used to connect wireless access points (WAPs) to form a wireless backbone? To do this successfully, the WAP needs to have two separate transmitter/receiver channels
Wireless distribution systems (WDS)
Which of the following is not an example of personally identifiable information (PII)
A list of passwords
Which service set for Wi-Fi devices is the cornerstone of wireless networks, defines a common topology, is typically connected to a distribution network such as an Ethernet LAN, and moves all communication through the access point?
Basic service set (BSS)
Which of the following is a type of mobile device control attack?
Bluetooth Wi-Fi hack
Common threats, such as browser exploits, snooping, radio-based communications, and stolen devices, fall under what type of threat?
Data theft threats
Which of the following is not an example of Internet of Things (IoT) electronics
Extension Cords
Which of the following is a feature of the Internet Protocol version 4 (IPv4)
Four octets
Mobile IP handles the change of IP address and maintains current sessions by using certain Mobile IP client stack specific components. Among these, which device changes its point of attachment from one subnet or network to another?
Mobile Node
Which regulatory standard was enacted to address investor confidence and corporate financial fraud through reporting standards for public companies
Sarbanes-Oxley Act (SOX)
True or False? Security is a concern for both mobile cloud apps and native mobile apps
true
The increased usage of fax machines is an example of what?
The network effect
The naming of generations of wireless technologies as "xG" began with which version?
3G
WLAN operates at which IEEE 802 standard?
802.11
For the past year or so, the ABC Hi-Tech store has advertised it is selling Wi-Fi 6 compatible access points. to what 802.11 standard does this product map?
802.11ax
of the following, which best describes circuit switching?
A physical connection made between two phones
From a developer's point of view, low development costs plus easy access to what make mobile app development profitable
Software development kits (SDKs)
What began as the result of a U.S. government project and is the predecessor of the internet
ARPANET
Which of the following is most responsible for the use of the hexagonal (Six-sided cell design of cellular coverage maps?
Cell Phone Transmission Power
Which of the following makes it possible for several mobile users to share multiple frequency bands at the same time by spreading the signal out over the frequencies? because it relies on lower powered signals, however, it suffers from the "near-far" problem
Code Division Multiple Access (CDMA)
This principle of information security that applies to both the privacy of information (protecting data from being seen) and its secrecy (hiding knowledge of data's existence or whereabouts) is:
Confidentiality
Which of the following wireless topologies uses seamless roaming, nomadic roaming, and collocation
Extended service set (ESS)
Lin is a wireless network engineer. She is performing a spectrum and protocol analysis on a branch office prior to implementing a wireless LAN (WLAN) Solution. She is currently concerned with microwave ovens, cordless phones, fluorescent bulbs, and Bluetooth radios. Which of the following is she addressing
Sources of noise and interference
True or False? the primary use case for vSAT is in home automation scenarios for products such as smart lighting and thermostat controllers and sensors
False
True or false? Bluetooth is suitable for wireless sensor network (WSN) nodes due to its ability to form an infrastructure network
False
true or false? "rooting" modifies the apple IOS to allow unsigned code to run on apple devices
False
A local cellular provider upgrades from 3G to 4G. Security experts and critical have n=known concerns about diameter, the signaling protocol used in 4G. What might be a potential impact from those concerns
Identity theft of the device's user
Of the following, which has a 128-bit address scheme
Internet Protocol Version 6 (IPv6)
Which of the following is true of the cellular handover process?
It ensures that subscribers can pass out of the range of one transmitter and into the area of another without losing the connection
Which of the following is not true of how a wireless access point (WAP) works?
It transmits beacons once per minute on the selected radio frequency (RF) band and channel to advertise its presence and configuration
An inherent issue with radio waves is that they reflect off certain materials and surfaces. This results in multiple versions of the same radio waves bouncing around known as:
Multipath
Which of the following is a method of increasing the data rate by dividing the available spectrum into smaller units, which makes better use of the available transmission frequencies within the 2.4 GHz and 5 GHz bands?
Orthogonal Frequency-division multiple access (OFDMA)
What has recently claimed a dominant position in networking, in part due to the addition of features such as power over ethernet (PoE) and improved speeds from 1 gigabit (Gb) to 40 Gb and even over 100 GB ethernet
Switching
True or False? Internet Protocol (IP) addressing enables a network to correctly route packets across a network
True
True or False? Regarding the Open System Interconnection (OSI) Reference Model, many people combine layers 5 through 7, referring to them as the "Application layer"
True
True or False? the Internet of things (IoT) has long been available through wired networks
True
True or false? A hash is most often associated with the integrity principle of information security
True
True or false? because a mobile device could well be shared by many authorized users, it is imperative to authenticate not just the user, but also the device
True
True or false? in mobile communications cellular design, each cell has its own antenna tower
True
Employees bringing and using their own devices at work is increasingly common. Advanced technology permits specific authorization when users use their own devices. A context-aware firewall grants the administrator special granularity compared to other firewalls, allowing rules to prevent:
User access outside of normal work hours
Which of the following is an alternative last-mile solution to carrier network's long term evolution (LTE) and digital subscriber line (DSL) networks because it is a high speed RF microwave technology that provides up to 1 Gbps bandwidth
WiMAX
which of the following is optimized for reliable and low latency communication of small data packets and is impervious to interference from Wi-Fi and other wireless technologies in the 2.4 Ghz range
Z wave
Which of the following is a security approach that considers internal and external networks to be completely untrusted
Zero Trust
Authorization is described as:
a process that works in conjunction with another method to grant access rights to a user, group, system, or application
The principle of information security that refers to the assurance that information is genuine, that it remains true to its original form, and that it has not been manipulated or tampered with is:
integrity
Which breakthrough technology first allowed users to switch phones without carrier involvement
the subscriber identity module (SIM) card
Which cellular network first used network authentication, which ensured that users connected to the correct network
3G
Dwayne is an innovator and inventor developing a product that is going to use the ISM band. He has obtained all of the necessary government permits. His product will be using the same bandwidth as Wi-Fi, Bluetooth, and radio-frequency identification (RFID). What is that bandwidth
2.4 GHz
What technology is most closely associated with augmented reality and virtual reality (AR and VR) mobile gamming?
5G
Which wireless standard was one of the earlier enablers of low-power network devices and can be used with 6LoWPAN
802.15.4
The first step in formulating blank is to ask questions such as "what constraints prevent you from protecting an asset?" and "is broad access required?"
A security plan
Which of the following contains eight fields of four-digit hexadecimal (base 16) numbers (0 to 9 and a to f)
An internet protocol version 6 (IPv6) Address
The principle of information security that is concerned with ensuring that systems and services are not withheld from users by unauthorized means is
Availability
Which of the following are laser wireless broadband wide area network (WAN) links that have a range of 3-5 kilometers line-of-sight and a throughput of 10 Gbps
Free Space Optics (FSO)
the first technology employing packet-switching, which allowed data sharing over mobile networks, was
GPRS
which of the following best illustrates the Network layer of the open systems and interconnection (OSI) reference Model?
Gerald is setting up a small home/office network for a friend. the network is both wired and wireless and he is configuring IPv4 addressing for each device
After experiencing many Ethernet network outages, a company decides to implement a wireless workgroup bridge as a backup. Which of the following is true of this solution?
It works well because the wired PCs continue to communicate with each other over the wireless bridge connection after a router or switch fails
Most companies employ a practice whereby personnel are given the rights and permissions to perform their jobs and nothing more. this is called?
Least privilege
Mahko is the cybersecurity expert for his company. The company has told employees that they must use their personal devices for business purposes in order to save money. However, Mahko struggles with how some staff members use their personal devices on their own time. He is concerned they do not meet the company's acceptable use standards. Which vulnerability is most important for Mahko to address?
Legal separation between personal and business use
Which low power wide area network (WAN) technology has a "star of stars" topology, whereby end node devices connect through gateways to network servers?
Long range wide area network (LoRaWAN)
Which of the following is another name for Wi-Fi 802.11ah, a standard for low-power wide area network (WAN) technology
Low power WiFi (HaLow)
Casey is installing a group of antennas for a wireless network. All of the antennas need to be tilted away from each other to introduce a measure of delay between the individual antenna radio signals. what type of antenna is he installing
MIMO antenna
Which layer of the Open Systems Interconnection (OSI) reference model handles communication paths between local area networks (LANS)? Internet Protocol (IP) exists at this layer as well
Network Layer
Which layer of the Open System Interconnection (OSI) Reference Model represents the signal path over which data is transmitted? This can include copper wires; optical fibers; or radio signals, such as Wi-Fi, WiMAX, and Bluetooth
Physical Layer
Carl is setting up a wireless network for his sister's family that will not require the use of a wireless access point (WAP). In this ad hoc network, each wireless network node must transmit a beacon that includes a timestamp for synchronization timing, the channel, the data rate, spread spectrum parameters, the SSID, and what else?
Quality of service (QoS) parameters
which low power wide are network (WAN) technology is an end to end system consisting of the presence of a certified modem at one end and a web based application at the other end
Sigfox
Which of the following was created to solve frequency interference problems with early cellular coverage map design?
Splitting up or segmenting frequencies
The Open System Interconnection (OSI) Reference Model defines seven layers that are collectively referred to as a:
Stack
A company recently installed a state of the art wireless system in a large building. However, the company is experiencing outages and blind spots throughout the building. Which of the following is a fix to the wireless problems
Tune wireless access points (WAPs) to operate on different channels
Which of the following consists of many wireless nodes connected as a local mesh or star configuration that cover a local area
Wireless sensor network (WSN)
while there is no "one size fits all" solution for all internet of things (IoT) technologies, which of the following would be the most likely technology solution for a smart building network that monitors internal environmental conditions
Wireless sensor network (WSN)
Which of the following takes advantage of its higher autonomous application and security layers to add support for 6LoWPAN and RPL (Routing Protocol for Low-Power and Lossy Networks) that optimize meshing and IP routing for wireless sensor networks?
Zigbee IP
True or false? with least privilege, unauthorized users would have to breach several forms of security to reach an intended target.
false
Which low power wide are network (WAN technology is highly susceptible to objects in its line of sight path and atmospheric conditions, such as light rain? In adverse conditions, this technology requires a high power boost to overcome the rain fade margin and that would rule it out for most internet of things (IoT) purposes
millimeter radio
Which of the following sends over the air signals to mobile devices to distribute configuration setting and provides a central point of control and policy
mobile device management (MDM)
True oor false? ISM is short for the industrial, scientific, and medical band of the unlicensed wireless spectrum
true