Professional Documents
Culture Documents
CNS Mid Imp
CNS Mid Imp
CNS Mid Imp
3. Mobile Device security falls under 3 categories. Which of these is not a valid Mobile
Device security category? [ ]
a) Barrier security b) Traffic security c) Device security d) All of the above
5. Which protocol is used for the purpose of copying the pending state into
the current State [
] a) Alert Protocol b) Handshake ProtocoL
c) Upper-Layer Protocol d) Change Cipher Spec Protocol
6. “A user intending to connect to one LAN may unintentionally lock onto a wireless access
point from the neighboring network.” Which type of Wireless network threat would you
classify this under? [
] a) Malicious Threat b) Network Injection
c) Denial Of Service d) Accidental Association
7. Which 2 protocols are used in the Transport layer of the TCP/IP model? [
] a) UDP and HTTP b) TCP and UDP c) HTTP and TCP d) ICMP and HTTP
12. An HTTP connection uses port _________ whereas HTTPS uses port ____________ and
invokes SSL.
14. In the handshake protocol _________________message type first sent between client
and server .