18 Flashcards

1
Q

Which of the following answers refers to a broadband cellular network technology?

A

4G/5G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A 2.4/5.0 GHz frequency range wireless network technology implemented in the IEEE 802.11 series of standards is commonly referred to as

A

WiFi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A popular, 2.4 GHz short-range wireless technology used for connecting various personal devices in a WPAN is known as:

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following answers refers to a security feature used in Bluetooth device pairing?

A

PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A very short-range communication method where a wireless signal is sent between two devices that are touching or nearly touching each other is a characteristic feature of:

A

** NFC **

Near Field Communication (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the answers listed below refers to a short distance, line-of-sight technology used for example in home remote controls?

A

** IR **

Infrared (IR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following would prevent using a mobile device for data exfiltration via cable connection?

A

DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A mobile device’s built-in functionality enabling the usage of locator applications is called:

A

GPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of software enables a centralized administration of mobile devices?

A

MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following facilitates the enforcement of mobile device policies and procedures?

A

MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following allows to erase data on a lost or stolen mobile device?

A

Remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of technology that provides control over the usage of a mobile device within a designated area is referred to as:

A

** Geofencing **

Geofencing creates a virtual geographical boundary that triggers a marketing action to a mobile device when a user enters or exits that boundary. An administrator or developer first establishes a virtual boundary around a certain location in GPS- or RFID-enabled software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user interface element controlling access to a mobile device after the device is powered on is called:

A

Screen lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The term “Push notification” is used to describe information delivery from a server to a client performed without a specific request from the client.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Context-aware authentication strengthens the authentication process by requiring the standard user credentials (username and password) to be coupled with additional items that can be used in the authentication process, such as:

A
  • Connection type used
  • Time of the day login patterns
  • Geolocation
  • Type of device used
  • IP address
    All of the above
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In the context of MDM, the isolation of corporate applications and data from other parts of the mobile device is referred to as:

A

** Containerization **

MDM containerization refers to the process of segregating personal and corporate data on personal devices by creating a logical container to enhance corporate data security

17
Q

A mobile security solution that enables separate controls over the user and enterprise data is called:

A

** Storage segmentation **

Containerization uses technical methods to store the data. This is often referred to as storage segmentation and it stores the data in a secure container. In this context, a secure container is typically an area on the device protected by both authentication and encryption

18
Q

MicroSD HSM is an example of a dedicated cryptographic processor residing on a miniature flash memory card. MicroSD HSM can be used to create, manage, and store cryptographic keys on any device with a matching card slot.

A

True

MicroSD HSM is a hardware security module coming in the form of a microSD card. It provides security services driven by hardware-based crypto engines, including encryption, key generation and key life cycle management, digital signature, authentication and other cryptographic functions.

19
Q

Implementing full device encryption is one of the methods for securing sensitive data on a smartphone. When enabled, this type of encryption works in conjunction with the phone’s screen lock, i.e. to decrypt the phone (which stays encrypted whenever the phone is locked), a user must first unlock the screen. On Android devices, the unlocking methods include entering a PIN, password, or swipe pattern. Apple devices use passcode and biometric fingerprint sensor (a.k.a. Touch ID).

A

True

20
Q

Which of the following answers refers to a software tool that provides a single management interface for mobile devices, PCs, printers, IoT devices and wearables?

A

** UEM **

Unified Endpoint Management (UEM) allows IT to manage, secure, and deploy corporate resources and applications on any device from a single console

21
Q

Which of the following answers refers to a dedicated mobile app management software?

A

** MAM **

Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users’ corporate and personal smartphones and tablets. MAM software allows IT administrators to apply and enforce corporate policies on mobile apps and limit the sharing of corporate data among apps.

22
Q

A type of mobile OS implementing more strict, Linux-based access security controls is known as:

A

** SEAndroid **

SEAndroid refers to Security Enhancements for Android, a security solution for Android that identifies and addresses critical gaps

23
Q

Installing mobile apps from trusted sources (e.g. Apple’s App Store for iOS devices, or Google Play for Android devices) instead of third-party application stores decreases malware-related security risks.

A

True

24
Q

The term “Rooting” refers to the capability of gaining administrative access to the operating system and system applications on:

A

Android devices

25
Q

Which of the following terms is used to describe the process of removing software restrictions imposed by Apple on its iOS operating system?

A

Jailbreaking