Which term describes the practice of actively collecting wireless networking data from companies and individuals?
A. War driving
B. Spear phishing
C. Dictionary attack
D. Social engineering
Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?
A. Direct Sequence Spread Spectrum (DSSS) signal
B. Media Access Control (MAC) address
C. Wi-Fi Protected Access 2 (WPA2)
D. Service Set Identifier (SSID)
Configuring a wireless network involves several steps. Which of the following is a task that should be performed to configure and connect to a wireless network?
A. Configure a certificate authority and configure the trust settings.
B. Configure the wireless AP's SSID, encryption level and shared key.
C. Connect your computer to the same network hub as the wireless AP.
D. Connect your computer to the same network switch as the wireless AP.
Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company's computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company's executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees.
What is a disadvantage of cloud-based services that Henry can cite to support his position?
A. Cloud-based services provide no maintenance or support.
B. Cloud-based services are typically more costly than in-house solutions.
C. The company must typically purchase additional servers to support connections to these types of cloud-based service providers.
D. Cloud-based services are typically more limited in offerings and configurations than the company currently supports in-house.
Which type of attack is a form of social engineering in which an attacker attempts to steal personal or confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic-looking but imposter Web site?
A. Replay
B. Phishing
C. Spoofing
D. Pharming
Lisa is traveling on company business. She has a company-issued smartphone with 4G access. Her hotel does not provide Internet access. What advantage does 4G provide to help her access the Internet?
A. She can use a 4G mobile hotspot device with her phone to connect her laptop to Wi-Fi.
B. She can use the 4G phone to establish a VPN connection into the company network.
C. She can use the41G phone to call and locate a public location that provides free Wi-Fl.
D. She can use her41G phone's GPS to identify another hotel that provides in-room Internet access.
Jenny recently switched from broadband cable Internet to ADSL service with her local phone company.
To economize, she chose the self-installation option. It appears that her ADSL modem is not allowing her to connect to the Internet. Which setting should she check first?
A. Loopback address
B. Software version
C. Default gateway
D. Device name
Cloud-computing enables mobile devices to provide users with access to a wide variety of applications and services. Which of the following is a disadvantage of mobile devices?
A. Mobile devices cannot accommodate Web browsing.
B. Mobile devices cannot easily be used for checking e-mail.
C. Mobile devices cannot access software hosted on remote servers.
D. Mobile devices cannot accommodate large database installations or applications.
Carol is experiencing read/write errors when trying to save files on her Windows-based laptop. To correct the issue, she could consider performing which of the following maintenance tasks?
A. Disk cleanup
B. fsck command
C. chkdsk command
D. Disk defragmentation
Your company is investigating the possibility of moving its customer service management system to a cloud service provider. The sales rep for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?
A. If your company's Internet service is interrupted for any reason at any time, you will not have access to the CRM.
B. More company employees will have access to the system, which could result in unauthorized access to confidential data
C. Special equipment will need to be purchased and maintained in your office in order to access and maintain the CRM once it is migrated to the hosted cloud service.
D. Migrating the CRM to the cloud service provider will eliminate several jobs in your customer service department because their job roles will no longer be required.