19 Flashcards

1
Q

Installing mobile apps from websites and app stores other than the official marketplaces is referred to as:

A

** Sideloading **

The process of installing applications on a device without the use of official software distribution channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Allowing “Unknown Sources” in Android Security Settings enables:

A

** Sideloading **

The process of installing applications on a device without the use of official software distribution channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following terms refers to a modified mobile device equipped with software features that were not originally designed by the device manufacturer?

A

Custom firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The practice of modifying a mobile device’s operation in such a way that it can be used with any service provider is called:

A

Carrier unlocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mobile device updates delivered over a wireless connection are known as:

A

** OTA **

Mobile device updates delivered over a wireless connection are typically referred to as “Over-the-Air” (OTA) updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following answers refers to a technology designated as a successor to SMS and MMS?

A

** RCS **

The technology designated as a successor to SMS and MMS is RCS, which stands for Rich Communication Services. RCS is designed to provide a more feature-rich and interactive messaging experience compared to traditional SMS and MMS messaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which technology enables establishing direct communication links between two USB devices?

A

** OTG **

OTG, which stands for USB On-The-Go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following answers refers to a privacy-related security risk connected with public sharing of pictures taken with smartphones?

A

Weak passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which technology enables establishing direct communication links between two wireless devices without an intermediary Wireless Access Point (WAP)?

A

WiFi Direct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A mobile device’s capability to share its Internet connection with other devices is referred to as

A

Tethering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The term “Mobile hotspot” refers to a type of WLAN that enables network access through a mobile device that acts as a portable WAP.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A mobile device deployment model that allows employees to use private mobile devices for accessing company’s restricted data and applications is known as:

A

** BOYD **

Bring Your Own Device (BYOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?

A

** COPE **

corporate-owned, personally-enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A mobile device deployment model in which employees select devices for work-related tasks from a company-approved device list is known as:

A

** CYOD **
choose your own device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In which of the mobile device deployment models a mobile device acts as a terminal for accessing data and applications hosted on a remote server?

A

** VDI **

Virtual desktop infrastructure (VDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following answers refers to a security policy enforcement software tool or service placed between cloud service users and cloud applications?

A

** CASB **

A Cloud Access Security Broker (CASB)

17
Q

A Secure Web Gateway (SWG) is a software component or a hardware device designed to prevent unauthorized traffic from entering an internal network of an organization. An SWG implementation may include various security services, such as packet filtering, URL/content filtering, malware inspection, application controls, Acceptable Use Policy (AUP) enforcement, or Data Loss Prevention (DLP).

A

True

18
Q

Which of the following answers refers to a trusted third-party service for validating user identity in a federated identity system?

A

** IdP **

An identity provider (IdP) is a system that creates, stores, and manages digital identities. The IdP can either directly authenticate the user or can provide authentication services to third-party service providers (apps, websites, or other digital services)

19
Q

Which of the following can be used to verify the identity of a client while establishing a session over TCP port 22? (Select all that apply)

A
  • Username and password
  • SSH Key
20
Q

A general characteristics of a standard user account is that it provides access to basic system resources but does not allow the user to make system changes.

A

True

21
Q

Which type of user account violates the concept of non-repudiation?

A

Shared account

22
Q

In MS Windows environments, Guest account is an account for users who do not have a permanent account on a Windows computer or domain. People using this type of account cannot install software or hardware, change settings, create passwords, or access protected files and folders. However, because the Guest account allows the user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn’t being used.

A

True

23
Q

Which of the following account types is not designed for an end user use?

A

Service account

24
Q

The two factors that are considered important for creating strong passwords are: (Select 2 answers)

A
  • Password length
  • Password complexity
25
Q

A strong password that meets the password complexity requirement should contain: (Select the best answer)

A

A combination of characters from at least 3 character groups