Module 5 Flashcards

1
Q

Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki’s advice regarding its. Which of the following would Enki NOT tell him?

A device connected via USB OTG can function as a host.
Connecting a mobile device to an infected computer using USB OTG could allow malware to be sent to that device.
A device connected via USB OTG can function as a peripheral for external media access.
USB OTG is only available for connecting Android devices to a subnotebook.

A

USB OTG is only available for connecting Android devices to a subnotebook.

USB OTG is available for both Android and Apple devices and can connect to a variety of different devices besides just a subnotebook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What prevents a mobile device from being used until the user enters the correct passcode?

Screen timeout
Touch swipe
Screen lock
Swipe identifier (SW-ID)

A

A screen lock prevents the mobile device from being accessed until the user enters the correct passcode, permitting access. Lock screens should be configured so that whenever the device is turned on or is inactive for a period, the user must enter the passcode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What allows a device to be managed remotely?

Mobile application management (MAM)
Mobile device management (MDM)
Mobile resource management (MRM)
Mobile wrapper management (MWM)

A

Mobile device management (MDM) tools allow a device to be managed remotely by an organization. MDM typically involves a server component, which sends out management commands to the mobile devices, and a client component, which runs on the mobile device to receive and implement the management commands. An administrator can then perform OTA updates or configuration changes to one device, groups of devices, or all devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates?

  • OEMs are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates.
  • Because many of the OEMs have modified Android, they are reluctant to distribute updates that could potentially conflict with their changes.
  • Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks.
  • Because OEMs want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely.
A

Because many of the OEMs have modified Android, they are reluctant to distribute updates that could potentially conflict with their changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?
BYOD
Corporate owned
CYOD
COPE

A

CYOD

-Employees choose from a limited selection of approved devices but the employee pays the upfront cost of the device while the business owns the contract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Alpha Tech started a charitable competition in which every team is asked to submit a proposal for a public health contract asking for a new viral transmission mitigation app.

Which team has selected the correct option?

Team A has selected MBSN.
Team B has selected BAN.
Team D has selected IR sensors.
Team C has selected ABSN.

A

IoT BAN is a wireless network of wearable computing devices. Sensors that continuously monitor body temperature are being proposed to help stem the transmission of viruses among humans. The sensors could help shut down emerging viruses before a pandemic can take hold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Photoplethysmography uses which type of light to measure heart rate on a wearable device?

Green
Red
Infrared
Ultraviolet

A

Green LED lights are used when the wearer is exercising by flashing green light onto the wrist hundreds of times per second. Human blood absorbs the green light. The heart rate can be determined by measuring the changes found in the green light absorption, and this method is called photoplethysmography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In which of the following mobile device connectivity methods are transmitters connected through a mobile telecommunication switching office (MTSO) that controls all of the transmitters in the cellular network and serves as the link between the cellular network and the wired telephone world?

Wi-Fi
Cellular
Infrared
Bluetooth

A

Many mobile devices rely on cellular telephony for connectivity. A cellular telephony network’s coverage area is divided into hexagon-shaped cells; in a typical city, the cells measure 10 square miles (26 square kilometers). At the center of each cell is a transmitter that mobile devices in the cell use to send and receive signals. The transmitters are connected through a mobile telecommunications switching office (MTSO) that controls all transmitters in the cellular network and serves as the link between the cellular network and the wired telephone world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which alert utility can identify theft in a smart meter?

Servicing
Emergency communication
Tamper protection
Meter readings

A

Tamper protection can alert a utility in the event of tampering or theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Zyan works for ABC Technology. The enterprise wants to provide smartphones to all its employees. They can choose from a limited list of approved mobile devices. But they need to pay for the device themselves. The company will pay them a monthly stipend. Which deployment method should Zyan suggest to meet his company’s needs?

Corporate-owned device (COD)
Choose your own device (CYOD)
Virtual desktop infrastructure (VDI)
Corporate-owned personally enabled (COPE)

A

In choose your own device (CYOD), employees choose from a limited selection of approved devices but pay the upfront cost of the device while the business owns the contract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dan uses his personal laptop for writing the script for an upcoming high-budget, highly anticipated movie. To keep the script private, he decided not to connect his laptop to any network and updated his system with the latest virus definitions and security patches. Which of the following is Dan’s laptop still vulnerable to?

DDoS
DNS poisoning
Malicious USB
Cross-site scripting

A

Dan’s laptop is still vulnerable to a malicious USB. A USB cable can be embedded with a Wi-Fi controller that can receive commands from nearby devices to send malicious commands to the connected mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following sensors help generate security alerts to physicians regarding patient health?

Accelerometer
BAN
Proximity sensor
SoC

A

A body area network (BAN) can monitor electrocardiogram (EKG) impulses, blood pressure, glucose, and other human biological functions and alert physicians to any anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following devices is similar to Raspberry Pi?

Real-time operating system
FPGA
SoC
Arduino

A

Arduino

A device similar to the Raspberry Pi is the Arduino. Unlike the Raspberry Pi, which can function as a complete computer, the Arduino is designed to control other devices; it has an 8-bit microcontroller, compared to the 64-bit microprocessor on the Raspberry Pi, a limited amount of
RAM, and no operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Marcus is an information security architect at a product-based IT firm. He is responsible for developing policies for the most-secure mobile device enterprise-deploying model. The company will decide the level of choice and freedom for employees. Employees are supplied company-chosen and paid-for devices that they can use for both professional and personal activities. This action is performed under which enterprise deployment model?

Corporate-owned device (COD)
Corporate-owned, personally enabled (COPE)
Bring your own device (BYOD)
Choose your own device (CYOD)

A

In COPE, employees are supplied the device chosen and paid for by the company, but they can also use it for personal activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

John has been appointed as a product manager at a large mobile device manufacturing company. He is designing the core features included in their flagship mobile device that will be launched during the holiday shopping season. Which of the following features should he primarily include?

Digital camera
Microphone
Data synchronization with a remote server or separate device
Global positioning system (GPS)

A

Data synchronization capabilities with a remote server or a separate computer/mobile device are a core feature of mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Akira is explaining to his team members the security constraints that have made it a challenge for protecting a new embedded system. Which of the following would Akira NOT include as a constraint?

a. Authentication
b. Cost
c. Power
d. Availability

A

b. Cost

17
Q

Agape has been asked to experiment with different hardware to create a controller for a new device on the factory floor. She needs a credit-card-sized motherboard that has a microcontroller instead of a microprocessor. Which would be the best solution?

a. Arduino
b. Raspberry Pi
c. SoC
d. FPGA

A

a. Arduino

18
Q

Hakaku needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution?

a. MCCM
b. MDM
c. UEM
d. MMAM

A

c. UEM

19
Q

What is the process of identifying the geographical location of a mobile device?

a. Geotracking
b. Geolocation
c. GeoID
d. Geomonitoring

A

b. Geolocation

20
Q

Which of these is used to send SMS text messages to selected users or groups of users?

a. Pull notification services
b. Replay notification distribution (RND)
c. Push notification services
d. MAM mass SMS 8

A

c. Push notification services

21
Q

Banko’s sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called?

a. Rooting
b. Sideloading
c. Jailbreaking
d. Ducking Copyright

A

a. Rooting

22
Q

Which of the following technologies can convert a texting app into a live chat platform?

a. MMS
b. QR
c. SMS
d. RCS

A

d. RCS

23
Q

Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document?

a. All modern versions of mobile device OS encrypt all user data by default.
b. Encryption occurs when the mobile device is locked.
c. Apple uses file-based encryption to offer a higher level of security.
d. Data backed up to an Apple or Google server could be unlocked by a court order.

A

c. Apple uses file-based encryption to offer a higher level of security.

24
Q

What does containerization do?

a. It splits operating system functions only on specific brands of mobile devices.
b. It places all keys in a special vault.
c. It slows down a mobile device to half speed.
d. It separates personal data from corporate data.

A

d. It separates personal data from corporate data.

25
Q

What allows a device to be managed remotely?

a. Mobile device management (MDM)
b. Mobile application management (MAM)
c. Mobile resource management (MRM)
d. Mobile wrapper management (MWM)

A

a. Mobile device management (MDM)

26
Q

Which of these is NOT a security feature for locating a lost or stolen mobile device?

a. Remote lockout
b. Last known good configuration
c. Alarm
d. Thief picture

A

b. Last known good configuration

27
Q

What enforces the location in which an app can function by tracking the location of the mobile device?

a. Location resource management
b. Geofencing
c. GPS tagging
d. Graphical Management Tracking (GMT)

A

b. Geofencing

28
Q

Which of these is considered the strongest type of passcode to use on a mobile device?

a. Password
b. PIN
c. Fingerprint swipe
d. Draw connecting dots pattern

A

a. Password

29
Q

Which of the following is NOT a context-aware authentication?

a. On-body detection
b. Trusted places
c. Trusted devices
d. Trusted contacts

A

b. Trusted places

30
Q

Which tool manages the distribution and control of apps?

a. MAM
b. MDM
c. MCM
d. MFM

A

a. MAM

31
Q

Which type of OS is typically found on an embedded system?

a. SoC
b. RTOS
c. OTG
d. COPE

A

b. RTOS