1.
Which of the following is an application development methodology?
2.
Which of the following is the name of the messaging service Android developers can use within their applications to send messages to Android devices?
3.
Which of the following should be monitored on mobile devices to mitigate the risk of a keylogger being installed?
4.
Which of the following MUST be implemented in conjunction with storage encryption to ensure data on a mobile device is secured?
5.
The board members of a financial institution have been supplied with tablets to conduct their annual meeting. Information discussed in the board room is sensitive in nature and should not be allowed onto the Internet. The operating system on the tablets has been updated to backup all information to the cloud. Which of the following would allow the administrator to learn about this feature before the meeting takes place in one week?
6.
Ann, a user, cannot access the company WiFi. She states that the WiFi signal is present and she has chosen the right SSID; however, each time Ann tries to access the network, she gets rejected. Which of the following is the BEST method to determine whether the mobile device is authorized to connect to the WiFi network?
7.
Joe, a technician, is assigned to design a wireless network for a SOHO that has to be able to support video streaming with an acceptable throughput, have good coverage for the building, and be able to support multiple channels with a full duplex capability. Which of the following is the BEST device to choose to support these requirements?
8.
Which of the following BEST describes the network elements for 3G and 4G cellular technologies?
9.
A technician has been given a task to implement a WiFi network in an office located on the second floor of a shopping mall with many other WiFi access points. The budget is limited so the technician has to use existing public devices to proceed. Which of the following is the BEST security implementation?