Chapter 12 ■ Practice Test 4 309
- Susan is setting up the network for a local coffee house and wants to ensure that users
have to authenticate using an email address and agree to the coffee house’s acceptable use
policy before being allowed on the network. What technology should she use to do this?
A. 802.11
B. NAC
C. A captive portal
D. A wireless gateway - What is another term for active monitoring?
A. Synthetic
B. Passive
C. Reactive
D. Span-based
- The TCP header is made up of elements such as the source port, destination port, sequence
number, and others. How many bytes long is the TCP header?
A. 8 bytes
B. 2 0–60 bytes
C. 6 4 bytes
D. 6 4–128 bytes
For questions 104–106, please refer to the following scenario:
The company that Fred works for is reviewing the security of their company-issued cell
phones. They issue 4G-capable smartphones running Android and iOS and use a mobile
device management solution to deploy company software to the phones. The mobile device
management software also allows the company to remotely wipe the phones if they are
lost.
- What security considerations should Fred’s company require for sending sensitive data
over the cellular network?
A. They should use the same requirements as data over any public network.
B. Cellular provider networks are private networks and should not require special
consideration.
C. Encrypt all traffic to ensure confidentiality.
D. Require the use of WAP for all data sent from the phone. - Fred intends to attend a major hacker conference this year. What should he do when con-
necting to his cellular provider’s 4G network while at the conference?
A. Continue normal usage.
B. Discontinue all usage; towers can be spoofed.
C. Only use trusted Wi-Fi networks.
D. Connect to his company’s encrypted VPN service.