IS3445 CHAP 13 SECURING ENDPOINT DEVICE COMMUNICATIONS Flashcards Preview

IS3445 SEC WEB APPS > IS3445 CHAP 13 SECURING ENDPOINT DEVICE COMMUNICATIONS > Flashcards

Flashcards in IS3445 CHAP 13 SECURING ENDPOINT DEVICE COMMUNICATIONS Deck (21)
Loading flashcards...
1
Q

___ is the evolution of different types of devices into a more common form that has a combination of features.

A

Convergence

2
Q

___ is a device or system that connects users to a communications or data network.

A

Endpoint device

3
Q

___ is an electronic tablet device that allows a user to download, store and read digital books.

A

E-reader

4
Q

___ is the ability to communicate at broadband (cable modem/DSL, or faster) speeds while being connected to a cellular network.

A

Mobile broadband

5
Q

___ is a service provided by cellular networks that allows the sending and receiving of multimedia messages between user. The content includes audio, video, digital images, ringtones, and more.

A

(MMS) Multimedia Messaging Service

6
Q

___ is a service provided by cellular networks that allows the sending and receiving of short messages between users. (Better known as texting.)

A

(SMS) Short Message Service

7
Q
  1. Which two security risks apply to IM chatting? (Select two)
  2. Theft of device
  3. Handoff
  4. Viruses and malware
  5. Denial of service (DoS)
A

Viruses and malware

Denial of service (DoS)

8
Q
  1. 3G networks use packet-switching to route voice calls.

TRUE OR FALSE

A

FALSE

9
Q
  1. Which type of device set the standard for the early generation of mobile devices due to its ability to integrate with corporate email systems and provide two-way pager communications?
  2. Analog cell phone
  3. Newton
  4. Blackberry
  5. Palm Pilot
A

Blackberry

10
Q
  1. ___ is a form of messaging used to share pictures, text pages and ringtones.
A

Multimedia Messaging Service or MMS

11
Q
  1. BlackBerry was instrumental in introducing what type of message delivery mechanism?
  2. Pull
  3. Push
  4. Analog
  5. PSTN
A

Push

12
Q
  1. 4G network speeds are comparable to DSL and cable modem Internet services.
    TRUE OR FALSE
A

TRUE

13
Q
  1. which of the following risks does not apply to Internet browsing?
  2. Viruses and malware
  3. Physical theft
  4. Phishing
  5. Java script execution
A

Physical theft

14
Q
  1. ___ is the threat related to voice communications and involves an unauthorized party listening in on conversations.
A

Eavesdropping

15
Q
  1. The term “endpoint” is typically used to describe what type of device?
  2. A device with large storage capacity
  3. A device with server capabilities
  4. A device that is no longer being manufactured
  5. A device that is connected to a public or private network
A

A device that is connected to a public or private network

16
Q
  1. PDAs were developed from two-way radio technology.

TRUE OR FALSE

A

FALSE

17
Q
  1. What is the minimum strength recommended for whole-device encryption?
  2. 144 Kbps
  3. 256-bit
  4. 248-bit
  5. There is no minimum
A

256-bit

18
Q
  1. There term ___ describes the merging of various types of devices and technologies into a common or single form.
A

Convergence

19
Q
  1. Which two controls provide physical security for devices? (Select two)
  2. VPN
  3. Locking the device
  4. Remote erasure
  5. Proxy servers
A

Locking the device

Remote erasure

20
Q
  1. A handoff, or the transfer of communications from one cell to another, was a significant factor regarding the mobility and popularity of cellular phones.
    TRUE OR FALSE
A

TRUE

21
Q
  1. Which form of communication is compatible across nearly all cellular networks and is widely considered to be the most often used communication method, by quantity, on todays phones?
  2. SMS Texting
  3. Voice over IP
  4. Text-to-speech
  5. File transfer
A

SMS Texting