Vous êtes sur la page 1sur 9

Lesson 12: Using Mobile Computers Multiple Choice 1.

Which type of attack describes jamming the wireless frequencies used by a transmitter? a) Eavesdropping b) Masquerading c) Denial of service d) Data tampering Answer: c Difficulty: Easy Section Reference: Understanding Wireless Security Explanation: Attackers can jam the wireless frequencies by using a transmitter, preventing legitimate users from successfully communicating with a Wireless Access point. 2. Which technology is the most common to connect to a wireless network for a corporation that allows a data rate up to 54 MB/sec? a) 802.11a b) 802.11b c) 802.11g d) 802.11n Answer: c Difficulty: Easy Section Reference: Evaluating Wireless Networking Hardware Explanation: 802.11 b only allows up to 11 MB/sec. 802.11a can go up to 54 Mb/sec but it is not the most common. 802.11g allows up to 54 Mb/sec communications and has an indoor range of about 35 meters. It is also backward compatible for 802.11b. 3. Which wireless technology allows up to 600 Mb/sec using MIMO? a) 802.11a b) 802.11b c) 802.11g d) 802.11n Answer: d Difficulty: Easy Section Reference: Evaluating Wireless Networking Hardware Explanation: 802.11n allows data rate up to 600 Mb/sec using 4x4 MIMO. MIMO is short for multipleinput multiple-output, which uses two transmitters and two receivers. 4. Which wireless technology is considered a weak encryption protocol? a) 802.1x b) WEP c) WPA d) WPA2 Answer: b Difficulty: Medium Section Reference: Using Wired Equivalent Privacy

Page 1 of 9

Explanation: WEP is a wireless security protocol that helps protect transmitted information by using a security setting, called a shared secret or a shared key, to encrypt network traffic before sending it. Unfortunately, the cryptography used by WEP is relatively weak, and programs that can analyze captured traffic and derive the key from it are readily available. Therefore, it is recommended to use WPA or WPA2. 5. Which encryption is considered the most secure? a) 802.1X b) WEP c) WPA d) WPA2 Answer: d Difficulty: Medium Section Reference: Using WiFi Protected Access Explanation: WPA (short for WiFi Protected Access) and WPA2 are currently the strongest commonly used wireless encryption schemes. However, WPA2 uses AES (Advanced Encryption System), which is stronger than TKIP (Temporal Key Integrity Protocol) used by original WPA. 6. Which encryption protocol was the first widely used wireless encryption protocol that used a unique encryption for each packet? a) 802.1X b) WEP c) WPA d) WPA2 Answer: c Difficulty: Medium Section Reference: Using WiFi Protected Access Explanation: WPA uses Temporal Key Integrity Protocol (TKIP), which encrypts data using the RC4 algorithm with a 128-bit key. This is the same algorithm as WEP, but TKIP virtually eliminates WEPs most exploited vulnerability by using a unique encryption key for each packet. 7. Which tool set is designed specifically for mobile PCs? a) Computer Management console b) Mobile Management console c) Windows Mobility Center d) Computer Information Center Answer: c Difficulty: Medium Section Reference: Using Windows Mobility Controls Explanation: Windows Mobility Center provides users with quick access to the configuration settings most commonly adjusted by mobile computer users. It is a shell application. It performs no special functions of its own; it simply provides a central point of access for many of the configuration settings that mobile computer users need frequently. 8. What protocol is used by network projectors to communicate? a) HTTP b) HTTPS c) RDP

Page 2 of 9

d) SSL Answer: c Difficulty: Hard Section Reference: Using a Display Projector Explanation: Network projectors are a different situation, because they do not connect directly to the video display adapter, and they are not automatically detectible by Windows 7. Instead of simply directing the monitor signal out through a VGA or DVI port, the computer uses the Remote Desktop Protocol (RDP) to transmit the monitor signals over the network to the projector device, which has the Windows Embedded CE operating system built into it. 9. What bundles together the configuration settings that users most often use when giving a presentation into a single switch? a) Mobility on the Go b) Presentation Settings c) Mobile Show d) Mobile Display Answer: b Difficulty: Medium Section Reference: Configuring Presentation Settings Explanation: The Presentation Settings dialog box provides quick access to the most common adjustments performed by presenters. Windows 7 includes a dialog box that bundles together the configuration settings that users most often adjust before giving a presentation and makes it possible to activate all of the settings with a single switch. 10. What technology is used to configure power settings using the graphical control panel? a) APM b) ACPI c) PIM d) PS Answer: b Difficulty: Working with Power Plans Section Reference: Working with Power Plans Explanation: Power management is the process of balancing conservation versus performance. Windows 7 includes extensive power management capabilities, including support for the Advanced Configuration and Power Interface (ACPI) and the ability to configure all power settings in three ways, using graphical control panel settings, Group Policy, or the command prompt. 11. Which command is used to manage power? a) PW.exe b) Powercfg.exe c) Pconfig.exe d) Power.exe Answer: b Difficulty: Hard Section Reference: Using Powercfg.exe Explanation: Powercfg.exe is the command line program for the Windows 7 power management system. As the most comprehensive power management interface, Powercfg.exe can configure settings that are

Page 3 of 9

not available from the Control Panel or in Group Policy. One of the most valuable capabilities of Powercfg.exe is the ability to export entire power management plans to a file, and then import them on another computer. 12. What do you use to synchronize between your computer, offline drives, and mobile devices? a) Transparent caching b) Partner Center c) Partner Sync Center d) Sync Center Answer: d Difficulty: Medium Section Reference: Using Sync Center Explanation: Sync Center is an application that functions as a central control panel for all of a Windows 7 computers synchronization partnerships, including those with network drives and mobile devices. Sync partnerships are pairs of folders or devices that are configured to synchronize their data on a regular basis. You can use Sync Center to establish synchronization partnerships, schedule synchronizations, monitor synchronization events, and manage synchronization conflicts. 13. What replaced ActiveSync to synchronize data files, email, appointments, and contact information with the mobile devices? a) Partner Sync Center b) Sync Center c) Windows Mobile Device Center d) BitLocker Answer: c Difficulty: Medium Section Reference: Using Windows Mobile Device Center Explanation: Using Windows Mobile Device Center, you cannot synchronize only data files with the mobile device; however, you can also synchronize certain types of application data, such as email, calendar appointments, and contact information. In addition, you can use Windows Mobile Device Center to browse through the files on the mobile device, access them as needed, and manage multimedia content, such as image, audio, and video files. 14. What technology enables users to protect specific files and folders, so that no one else can access them? a) EFS b) BitLocker c) BitLocker To Go d) Compression Lock Answer: a Difficulty: Easy Section Reference: Using BitLocker Explanation: Encrypting File System (EFS), which is part of NTFS, enables users to protect specific files and folders, so that no one else can access them. 15. If you dont have TPM, how else can you use BitLocker? a) Store the encryption key on a USB flash drive. b) Store the encryption key on the C:\ folder.

Page 4 of 9

c) Store the encryption key in the CMOS area. d) Use a designated PIN. Answer: a Difficulty: Hard Section Reference: Using BitLocker Explanation: When you use the Startup key only, the BitLocker configuration process stores a startup key on a USB flash drive, which the administrator must insert each time the system boots. This mode does not require the server to have a TPM chip, but it must have a system BIOS that supports access to the USB flash drive before the operating system loads. 16. What user account has the ability to recover BitLocker drives for an entire organization? a) Domain administrators b) Data recovery agent c) BitLocker administrators d) Protected admins Answer: b Difficulty: Medium Section Reference: Using Data Recovery Agents Explanation: A data recovery agent (DRA) is a user account that an administrator has authorized to recover BitLocker drives for an entire organization with a digital certificate on a smart card. In most cases, administrators of Active Directory Domain Services (AD DS) networks use DRAs to ensure access to their BitLocker-protected systems, to avoid having to maintain large numbers of individual keys and PINs. 17. What technology is used to encrypt removable USB devices? a) BitLocker b) BitLocker To Go c) NTFS Encryption d) Smart Card To Go Answer: b Difficulty: Medium Section Reference: Using BitLocker To Go Explanation: BitLocker To Go is a new feature in Windows 7 that enables users to encrypt removable USB devices, such as flash drives and external hard disks. Although BitLocker has always supported the encryption of removable drives, BitLocker To Go enables you to use the encrypted device on other computers without having to perform an involved recovery process. Because the system is not using the removable drive as a boot device, a TPM chip is not required. 18. What technology uses the remote client to connect to a remote access server over the Internet? a) To Go b) Network Connect c) VPN d) DirectCache Answer: c Difficulty: Easy Section Reference: Understanding Virtual Private Networking

Page 5 of 9

Explanation: In a virtual private network (VPN) connection, the remote client and the remote access server are both connected to the Internet, using local service providers. This eliminates the expense of long-distance telephone charges common to dial-up connections and the additional hardware expense because both computers most likely have Internet connections already. 19. Which VPN protocol connects using SSL? a) PPTP b) L2TP c) SSTP d) IKEv2 Answer: c Difficulty: Hard Section Reference: Understanding Virtual Private Networking Explanation: Secure Socket Tunneling Protocol (SSTP) was introduced in Windows Server 2008 and was supported only by clients running Windows Vista SP1 or later. SSTP encapsulates PPP traffic using the Secure Sockets Layer (SSL) protocol supported by virtually all web servers. The advantage of this is that administrators do not have to open an additional external firewall port in the server, because SSTP uses the same TCP port 443 as SSL. SSTP uses certificates for authentication, with the EAP-TLS authentication protocol, and in addition to data encryption, provides integrity checking and enhanced key negotiation services. 20. What does L2TP use to encrypt data? a) PPTP b) IPsec c) 802.1x d) PIN Answer: b Difficulty: Easy Section Reference: Understanding Virtual Private Networking Explanation: L2TP relies on the IP security extensions (IPsec) for encryption and as a result performs a double encapsulation. 21. What feature is based on IKEv2 Mobility and Multihoming protocol that reconnects to a VPN server automatically after an interruption? a) Persistent Connection b) Persistent VPN c) Consistent VPN d) VPN Reconnect Answer: d Difficulty: Medium Section Reference: Using VPN Reconnect Explanation: Windows 7 includes a new feature called VPN Reconnect, based on the IKEv2 Mobility and Multihoming (MOBIKE) protocol, which enables a computer to reconnect to a VPN server automatically, after an interruption as long as eight hours. VPN only works with connections that use the IKEv2 protocol, which means that the client must be running Windows 7 and the remote access server must be running Windows Server 2008 R2.

Page 6 of 9

22. What component is used to ensure that all clients meet a minimum set of criteria such as up-to-date anti-virus protection and Windows updates? a) VPN Reconnect b) Network Access Protection c) Remote App d) Direct Access Answer: b Difficulty: Medium Section Reference: Understanding Network Access Protection Explanation: Network Access Protection (NAP) is a component of the Network Policy and Access Services role in Windows Server 2008 and Windows Server 2008 R2, which is designed to prevent potentially dangerous clients, local or remote, from connecting to the network. Server administrators can configure NAP with security health validators (SHV) that ensure that all clients meet a minimum set of criteria before allowing them to connect. 23. _______________ enables remote users to automatically connect to the computer network whenever they have Internet access. a) DirectAccess b) BranchCache c) Remote App d) Network Access Protection Answer: a Difficulty: Medium Section Reference: Introducing DirectAccess Explanation: Designed as a replacement for VPNs, DirectAccess eliminates the need for client users to manually establish wide area connections to their networks. As soon as the client computer accesses the Internet, the system automatically initiates the connection to the network. 24. What protocol does DirectAccess use to encrypt network communications? a) SSTP b) IPSec c) PPTP d) 802.1x Answer: b Difficulty: Medium Section Reference: DirectAccess and IPsec Explanation: IPsec is a collection of IP extensions that provide additional security for network communications. DirectAccess relies on IPsec for authentication of users and computers and for encryption of the data exchanged by clients and servers. Fill in the Blank 25. ____________ is new to Windows 7 and Windows Server 2008 that uses TCP Port 500 to create a VPN connection. Answer: Internet Key Exchange, Version 2 Difficulty: Hard

Page 7 of 9

Section Reference: Understanding Virtual Private Networking Explanation: Internet Key Exchange, Version 2 (IKEv2) is new in Windows 7 and Windows Server 2008 R2, which uses TCP port 500 to create a VPN. By default, Windows 7 computers use IKEv2 when attempting to connect to remote access servers, only falling back to the other protocols when the server does not support it as well. 26. __________ is used as an external display that displays images on a screen. Answer: Display projector Difficulty: Easy Section Reference: Using a Display Projector Explanation: For presentations to larger audiences, many portable computer users prefer to use a display projector as an external display, instead of a standard monitor. A display projector is a device that works much like a monitor, except that instead of displaying an image on a screen, it projects a live image of the computers desktop onto a screen. 27. A(n) ____________ is a combination of power management settings that provides a balance between power consumption and system performance. Answer: Power plan Difficulty: Medium Section Reference: Working with Power Plans Explanation: A power plan is a combination of power management settings that provides a balance between power consumption and system performance. Windows 7 includes three default power plans: Balanced (recommended), Power Saver, and High Performance. 28. _______________ is a form of fault tolerance that individual users can employ to maintain access to their server files, even in the event of a network service failure. Answer: Offline files Difficulty: Medium Section Reference: Using Offline Files Explanation: Offline Files is a form of fault tolerance that individual users can employ to maintain access to their server files, even in the event of a network service failure. Windows 7 workstations copy serverbased folders that users designate for offline use to the local drive, and the users work with the copies, which remain accessible whether the computer is connected to the network or not. 29. The _______________ policy causes Windows 7 to save copies of files that users access from remote servers on a local drive, whether or not the files are configured as offline files. Answer: Enable Transparent Caching Difficulty: Hard Section Reference: Using Offline Files Explanation: Transparent caching is functionally similar to the BranchCache feature, except that each Windows 7 workstation has exclusive use of its own cache; it does not share the cached files with other clients. Short Answer 30. Explain what is needed to perform BitLocker.

Page 8 of 9

Answer: BitLocker requires a Trusted Platform Module (TPM) and a system BIOS that is compatible with its use. Difficulty: Hard Section Reference: Understanding BitLocker Requirements Explanation: BitLocker can operate in several modes, depending on the degree of security the computer requires. With one exception, all of the available BitLocker modes require the computer to have a Trusted Platform Module (TPM), and a system BIOS that is compatible with its use. The TPM is a dedicated cryptographic processor chip that the system uses to store the BitLocker encryption keys.

Page 9 of 9

Vous aimerez peut-être aussi