Cwse 1

50 Questions

Settings
Please wait...
Fitness Quizzes & Trivia

This exam is designed to assess technical knowledge of Wandera's Secure Mobile Gateway services. The questions are mostly multiple choice. This is a timed test, you have 60 minutes to complete all questions.  You are required to achieve a score of 75% in order to become a Certified Wandera Sales Engineer.Good luck!


Questions and Answers
  • 1. 
    What did Wandera pioneer?
    • A. 

      MDM - Mobile Data Management

    • B. 

      SMG - Secure Mobile Gateway

    • C. 

      MDA - Mobile Data Applications

    • D. 

      MAM - Mobile Application Management

  • 2. 
    What key benefits does View, Extend and Secure provide to customers?
    • A. 

      Scalability, Savings and Speed

    • B. 

      Visibility, Performance and Security

    • C. 

      Visibility, Savings and Security

    • D. 

      Scalability, Simplicity and Savings

  • 3. 
    How is Wandera priced?
    • A. 

      Subscription fee per device per month

    • B. 

      Subscription fee per device per month plus an annual support fee

    • C. 

      Subscription fee per user per month

    • D. 

      As a percentage of savings

  • 4. 
    What does APN stand for?
    • A. 

      Alternative Point Network

    • B. 

      Application Program Network

    • C. 

      Access Pin Number

    • D. 

      Access Point Name

  • 5. 
    What does the Wandera App do? 
    • A. 

      It routes the traffic through Wandera Secure Mobile Gateway

    • B. 

      It provides notification service and blocks traffic based on policy

    • C. 

      It generates end-user reports, provides location data and heartbeat information to the Wandera service

    • D. 

      It compresses content to be routed through the Secure Mobile Gateway

  • 6. 
    What happens when a user is "blocked" by a Wandera policy?
    • A. 

      The internet stops working completely

    • B. 

      The device shuts down

    • C. 

      The user can't access the specific site or app

    • D. 

      All mobile data is blocked

  • 7. 
    How is Wandera installed on mobile devices?
    • A. 

      An App and an APN profile are installed

    • B. 

      An APN profile is installed

    • C. 

      An App is installed

    • D. 

      A VPN profile is installed

  • 8. 
    What does a Wandera APN setting do?
    • A. 

      It configures a web proxy setting on the device to ensure cellular web data is routed via Wandera's SMG

    • B. 

      It installs a web proxy setting to ensure all cellular traffic bypasses the phone carrier network

    • C. 

      It creates a VPN connection to the Secure Mobile Gateway

    • D. 

      It ensures that all cellular and wifi traffic is routed via Wandera

  • 9. 
    How long is a free Wandera trial or Proof of Concept?
    • A. 

      14 days

    • B. 

      21 days

    • C. 

      30 days

    • D. 

      2 months

  • 10. 
    What happens when a roaming user reaches their "data cap"? 
    • A. 

      All cellular web data is blocked (except for the admin-configured whitelist exceptions)

    • B. 

      All cellular data is blocked except for email

    • C. 

      All web data including wifi is blocked

    • D. 

      All traffic including tethering is blocked

  • 11. 
    How can a user be enrolled in Wandera?
    • A. 

      The admin contacts the mobile carrier to request a Wandera APN

    • B. 

      The users download the APN Profile from Wandera website

    • C. 

      Devices can be enrolled in RADAR (individually or in bulk) in which the admin generates an enrolment email or SMS.

    • D. 

      Devices can be enrolled by pushing a Managed App Config from a supported EMM solution

  • 12. 
    Caps can be set:
    • A. 

      Per Hour

    • B. 

      Daily and Monthly

    • C. 

      Annual

    • D. 

      Daily

  • 13. 
    What is RADAR ?
    • A. 

      The name of the Android and iOS App

    • B. 

      It is a cloud-based administration portal where authorised admins can add/manage users, configure compression & policy settings and view data usage and security reports.

    • C. 

      The name of the APN Settings in the device

  • 14. 
    What cost plans can be configured in RADAR?
    • A. 

      Cost per MB while roaming and the monthly cost for a domestic plan. Cost plans are limited to a single carrier.

    • B. 

      Cost per MB while roaming per country and monthly cost for a domestic plan. Cost plans can be set and created for each carrier.

    • C. 

      Cost of monthly domestic and roaming plan only.

  • 15. 
    What can an admin determine from the Apps/Sites report provided in View?
    • A. 

      Data usage of apps

    • B. 

      Popularity of apps

    • C. 

      Data usage and popularity of apps

  • 16. 
    How does Wandera calculate savings?
    • A. 

      Data saved by compression and estimated savings through usage policy

    • B. 

      Number of caps multiplied by an estimated saving per cap

    • C. 

      Roaming data saved multiplied by an average $1 per MB

    • D. 

      Data saved through compression only

  • 17. 
    Which type of data is routed via the Wandera service but isn't compressed?
    • A. 

      P2P

    • B. 

      HTTPS

    • C. 

      Tethered traffic

    • D. 

      HTTP

  • 18. 
    What compression settings can be configured in RADAR?
    • A. 

      Text, Images and Video

    • B. 

      Images and YouTube

    • C. 

      Images and Video

    • D. 

      Javascript and CSS

  • 19. 
    What optimization techniques does Wandera Extend use (among others)? 
    • A. 

      Conflation, Text, Image and Video compression and Pre-Fetching

    • B. 

      Text zipping, Caching and Email compression

    • C. 

      Image compression, Email compression and SSL termination proxy

    • D. 

      VoIP compression, Audio compression and Caching

  • 20. 
    What mobile platforms does Wandera's SMG support today? (Select all that apply)
    • A. 

      BlackBerry Devices

    • B. 

      IOS Devices

    • C. 

      Android Samsung

    • D. 

      Windows Phone

  • 21. 
    What happens to WiFi traffic? 
    • A. 

      WiFi traffic is redirected via Wandera and is optimized

    • B. 

      WiFi traffic is redirected via Wandera but isn't optimized

    • C. 

      Wifi traffic is not handled by Wandera yet but a wifi deployment option for iOS will be released soon to provide broader security coverage

  • 22. 
    What happens to most corporate email traffic? 
    • A. 

      Email isn't redirected via Wandera

    • B. 

      Email traffic passes through the Wandera Secure Mobile Gateway but isn't compressed

    • C. 

      Email traffic is compressed by Wandera

  • 23. 
    What happens to corporate VPN traffic (ie. not Wandera VPN traffic)? 
    • A. 

      VPN traffic is not routed via Wandera SMG but is metered/counted as non-web data

    • B. 

      VPN traffic passes through Wandera but isn't compressed

    • C. 

      VPN traffic is compressed via the app but isn't routed via Wandera

  • 24. 
    What happens to tethered / personal hotspot traffic?
    • A. 

      Tethered traffic is redirected via Wandera through a separate VPN and compressed in real-time

    • B. 

      Tethered traffic is redirected via Wandera but isn't optimised

    • C. 

      Tethered traffic isn't redirected via the SMG but is metered and can be capped or blocked by Wandera

  • 25. 
    Which data center providers does Wandera use?
    • A. 

      An regionally optimised mix of public cloud providers and co-location including AWS and Rackspace.

    • B. 

      Wandera builds its own data centers

    • C. 

      Level 3 and BT

    • D. 

      Centralised data center provided by Rackspace

  • 26. 
    When a customer admin makes a policy change in RADAR, how quickly is the update pushed out to the proxies?
    • A. 

      Immediately

    • B. 

      Within 15 minutes, due to caching in the publishing system

    • C. 

      At the end of the customer's day, in line with cap rollovers

  • 27. 
    What percentage of availability does Wandera deliver to its customers?
    • A. 

      99.9%

    • B. 

      99.95%

    • C. 

      99.999%

    • D. 

      95%

  • 28. 
    The Wandera Architecture has been built to be what?
    • A. 

      Bare Metal

    • B. 

      Hosted in our own datacenters

    • C. 

      Cloud Specific

    • D. 

      Cloud Agnostic

  • 29. 
    If a server fails how long does it typically take to switch over to a Backup server?
    • A. 

      1 second

    • B. 

      1 minute

    • C. 

      1 hour

    • D. 

      1 day

  • 30. 
    Wandera's offering consists of three key services/products.  What are they?
    • A. 

      Secure, View and Extend

    • B. 

      View, Optimization and Management

    • C. 

      Extend, Mobility and Visibility

    • D. 

      Compression, Reporting and Security

  • 31. 
    What protocols are routed through the Wandera SMG?
    • A. 

      HTTP (80) and HTTPS (443) traffic

    • B. 

      All TCP traffic

    • C. 

      TCP and UDP traffic

    • D. 

      All traffic except VoIP

  • 32. 
    Which of the following are reports available under Wandera View? (Select all that apply)
    • A. 

      Usage

    • B. 

      Roaming

    • C. 

      Real-time

    • D. 

      Blocks

    • E. 

      Usage time

    • F. 

      Sites / Apps

    • G. 

      BYOD

    • H. 

      Business / Personal

    • I. 

      User Summary

  • 33. 
    What is Wandera Secure?
    • A. 

      An anti-virus solution for mobile devices

    • B. 

      A multi-level security solution designed to prevent mobile threats on mobile devices

    • C. 

      An intrusion prevention system for mobile devices

    • D. 

      A next-gen personal firewall for mobile devices such as iPhones and Androids

  • 34. 
    How does Wandera Secure help to keep enterprise’s mobile devices secure?
    • A. 

      By capturing network traces and device information to identify system-wide risky or malicious behaviour

    • B. 

      By wrapping and containerizing apps, thereby protecting corporate data

    • C. 

      By controlling logins to enterprise cloud services for corporate data loss prevention and encryption

    • D. 

      By installing an agent on the device that locks it down through a policy-based configuration

  • 35. 
    Why is Wandera Secure a multi-level solution?
    • A. 

      Because it uses multiple virus scanners and malware databases

    • B. 

      Because it uses multiple machine learning technologies

    • C. 

      Because it leverages multiple Wandera data centers around the world

    • D. 

      Because Wandera collects security related information from multiple sources at different levels

  • 36. 
    How can administrators use Wandera Secure to measure the severity of threats that impact a device or organization? (Select all that apply) 
    • A. 

      A ranking of the top 10 devices is available in RADAR

    • B. 

      A risk score between 0 and 100 indicating the level of risk in RADAR

    • C. 

      The admin receives a digest email summarising the high impact threats

  • 37. 
    What is Smartwire Threat Intelligence?
    • A. 

      Wandera's proprietary threat detection engine

    • B. 

      A large database of known malware

    • C. 

      An app reputation database

    • D. 

      A highly specialised virus scanner for mobile threats

  • 38. 
    What are device 'Heartbeats'?
    • A. 

      These are mobile data requests that are scanned in real-time at the Wandera Secure Mobile Gateway

    • B. 

      Blocked pages which the device attempt to access through the mobile device

    • C. 

      Configuration, apps, events and logs collected from the device by the Wandera app

  • 39. 
    How does a customer deploy/activate Wandera Secure?
    • A. 

      Existing customer can make an in-app purchase to upgrade

    • B. 

      New Secure customer can sign up and leverage the same existing Wandera deployment mechanism. No need to install anything.

    • C. 

      New customer can sign up and manually create new proxy profiles on the end user devices

    • D. 

      Existing customer will need to uninstall the existing app, and install a new one to activate the service

  • 40. 
    Where is the data stored and for how long?
    • A. 

      Wandera securely drops web log data within the standard retention period of 6 months from a secure data center in Ireland (EEA) where this data is replicated for redundancy.

    • B. 

      Wandera securely drops web log data within the standard retention period of 12 months from a secure data center in Ireland (EEA) where this data is replicated for redundancy.

    • C. 

      Wandera securely drops web log data within the standard retention period of 2 years from a secure data center in Ireland (EEA) where this data is replicated for redundancy.

    • D. 

      Wandera securely drops web log data within the standard retention period of 5 years from a secure data center in Ireland (EEA) where this data is replicated for redundancy.

  • 41. 
    What Secure reports and views are available in RADAR?
    • A. 

      Threats, Device and Raw Security Events

    • B. 

      Time based and Threat based reports

    • C. 

      User and Event based reports

  • 42. 
    Who should receive Secure notifications and why?
    • A. 

      Only end users. It is a user's responsibility to ensure their device is secure and to protect the company. They will know what to do when a threat is detected.

    • B. 

      Only administrators. Administrators set policy and it is there job to enforce it with the end user. The user should not worry about insecure behaviour until an administrator contacts them

    • C. 

      Both administrators and end users. Users require education and warning when they are exhibiting insecure behaviour. Administrators need to know so they can follow up on threats and ensure any vulnerabilities are closed.

  • 43. 
    What is required to remediate a Man-in-the-Middle attack?
    • A. 

      Warn the user to disconnect from the relevant hotspot via Wandera push notifications.

    • B. 

      Reset the device log in credentials. New passwords will prevent this from happening again.

    • C. 

      Using Wandera Secure, use the hotspot and certificate information to conduct an investigation.

  • 44. 
    What happens when Wandera detects Phishing, Spam and Malicious Sites?
    • A. 

      Wandera alerts the users so they can stop visiting those websites.

    • B. 

      Wandera proactively blocks the traffic to those sites and notifies the users.

    • C. 

      Wandera notifies the Administrators so they can remediate using an EMM / MDM if available

  • 45. 
    Why would customers want to upload their corporate Public Certificate to RADAR?
    • A. 

      To help Wandera identify dangerous certificates.

    • B. 

      To make sure traffic is blocked based on your corporate policy.

    • C. 

      If the customer decrypts secure traffic on it's corporate networks, an administrator can upload any public certificates to make sure no false positives occur.

  • 46. 
    What are some of the benefits of EMM Connect ? (Select all that apply)
    • A. 

      Ability to get location updates even if Location Services is disabled on the device

    • B. 

      Ability to Intelligently disable mobile data to prevent bill shock as a result of tethering

    • C. 

      Ability to enforce a Screen Lock Password on the devices

    • D. 

      Ability to leverage EMM APIs to catalog the current inventory of applications on the device seeding the Wandera threat correlation engine to detect device and network based threats

  • 47. 
    What are some of the main functionalities of EMM Connect? (Select all that apply)
    • A. 

      Asset Information: to ensure that device information is up ­to ­date and any changes are brought into RADAR automatically.

    • B. 

      Additional Roaming Status: by retrieving from the EMM the device’s current carrier, which can be used to determine roaming state and ensure data policies for roaming/domestic usage are applied regardless of the app being present on the device. Wandera recommends using both the app and EMM Connect as each provides its own benefits to the service.

    • C. 

      App Inventory: by building a catalog of the current inventory of applications on the device which is beneficial for Wandera Secure, seeding the Wandera threat correlation engine to detect device and network based threats.

    • D. 

      Application Management policy enforcement which allows an admin to remove applications remotely from Radar

  • 48. 
    What is Semi-Jailbreak and why it represents a high risk to your organisation?
    • A. 

      Semi-JB is the process of downgrading your device to an older version of OS allowing hackers to exploit known security bugs.

    • B. 

      Semi-JB is the name of a fun and addictive shooting game for IOS that keeps people in your organisation distracted playing against each other.

    • C. 

      Semi-Jailbreak is the name of a Hacker Organisation that work from prison.

    • D. 

      Semi-JB is a minor version of a Jailbreak vulnerability that enables end users to easily install side-loaded apps, which may contain malware.

  • 49. 
    How does Wandera provide redundancy?
    • A. 

      Wandera uses multiple data centres from industry leading cloud providers to host its applications and data, providing essential redundancy and availability. The infrastructure is designed to provide a 99.999% availability.

    • B. 

      Wandera hosts its applications and data in robust on-site servers in their London offices and maintain several tape backups to provide availability in case of failure.

    • C. 

      Wandera have spare computers which are not strictly necessary to functioning, in case of failure in the main servers.

  • 50. 
    How are mobile threats categorised and secured by Wandera? (Select all that apply)
    • A. 

      Device Configuration: threats like Jailbreaks and Semi-JBs, Outdated Operating Systems, and Malicious Profiles and Certificates. As a Multilevel solution, Wandera has access to both the data running over the network and the device configuration information enabling us to protect from these vulnerabilities.

    • B. 

      Network and Web threats: like Spam, Phishing and other Browser Exploits. By operating an in-line cloud proxy, Wandera can stop these attacks proactively before they affect the device and your corporate environment.

    • C. 

      Insecure Apps: Even approved apps leak confidential information and request unnecessary access allowing hackers to craft a whole new world of threats like side-loading apps and private and malicious APIs access among others. Wandera detects, notifies and has the ability to block if private information is being leaked in real time.

    • D. 

      Real Time Activity Threats: like Man in the Middle Attacks, Rogue hotspots, Phishing WiFis, etc. These threats are in the rise and consist of attackers setting up rogue hotspots (aka honeypots), mainly for free to intercept all the data coming in and out from the mobile device. These attacks represent a huge risk to your organisation as confidential and private information (like usernames and passwords) is easily captured by the attackers allowing them to create persistent attacks and access individuals' and companies' resources.

    • E. 

      Malware Threats: which include viruses, worms and trojans, rootkits and backdoors among other threats.

    • F. 

      Spyware Threats: like trackware and adware. These programs may offer a useful service in exchange for being allowed to gather information from or about the user.

    • G. 

      Riskware Threats which are considered safe when used by an authorised person in an appropriate situation. If misused, or used by an attacker, the program may be a security risk, for example keyloggers.