Which of the following would be used to enforce a policy requiring two-factor authentication on
certain mobile devices?
A. Username and password
B. Facial recognition and PIN
C. Pattern unlock and password
D. Fingerprint and retina scan
An employee reports a network connectivity issue to the helpdesk. Which of the following steps
should be taken before escalating the issue?
A. Identify and document the issue, questioning the obvious
B. Attempt to resolve the network issue by rebooting a server
C. Ask the user to remote their machine and wait 15 minutes before calling back
D. Document resolution outcomes and lessons learned
Which of the following can be applied to a mobile device to support a corporate mandate which
does not allow Internet gambling activities?
A. Network IDS
B. Host IDS
C. Software antivirus
D. Content filtering
When setting up a wireless access point for 802.11g, the user must ensure mobile devices utilize
which of the following frequency bands?
A. 2.4 MHz
B. 5 MHz
C. 5 GHz
Which of the following is a topology that uses multiple access points to communicate with each
other to pass data?