Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
A+ Practice Core 2 Test 10
Home
A+ Practice Core 2 Test 10
Start your A+ Practice Core 2 Test 10
A characteristic feature of _________ is AES-based encryption mode.
a. WEP
b. WPA2
c. PAP
d. WPA
None
A protocol used for monitoring network-attached devices is known as:
a. IPsec
b. SMTP
c. ICMP
d. SNMP
None
An undocumented way of gaining access to a program is referred to as:
a. Root access
b. Administrative access
c. Zero-day vulnerability
d. Backdoor
None
Apple iOS devices include ________ Mobile device synchronization methods
a. iTunes
a. OneDrive
b. Remote Disk
c. Dropbox
None
A unique number which is used for identification of a physical mobile device is known as:
a. MAPI
b. IMEI
c. SSID
d. IMSI
None
The configuration settings a cellphone is shipped with is referred to as:
a. PRI
b. RIS
c. PII
d. PRL
None
A wireless network Access Point is commonly referred to as:
a. Hotspot
b. Proxy
c. Hub
d. Gateway
None
Mobile apps for iOS are available at
a. Google Play
b. App Store
c. Windows Marketplace for Mobile
d. Amazon Appstore
None
A network security that combines the functionality of a firewall with additional safeguards is termed as Unified Threat Management.
a. True
b. False
None
Establishing connection between Bluetooth devices is commonly referred to as:
a. Linking
b. Three-way handshake
c. Crosstalk
d. Pairing
None
Time's up