Chapter 10 Flashcards

Combo: Quiz 10 plus Book End of Chapter Questions

1
Q

Which technology is NOT a core feature of a mobile device?

a. Physical keyboard
b. Small form factor
c. Local non-removable data storage
d. Data synchronization capabilities

A

a. Physical keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Agape was asked to make a recommendation regarding short-range wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she NOT consider due to its slow speed and its low deployment levels today?

a. ANT
b. Bluetooth
c. Infrared
d. NFC

A

c. Infrared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Calista is designing the specifications for new laptop computers to be purchased by her company. She is comparing the different types and sizes of USB connections found on the devices. Which type USB connection would she NOT find on a laptop? `

a. Type D
b. Mini
c. Micro
d. Standard

A

a. Type D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?

a. BYOD
b. COPE
c. CYOD
d. Corporate-owned

A

c. CYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pakpao has been asked to provide research regarding a new company initiative to add Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Pakpao NOT list in his report as a factor in the frequency of Android firmware OTA updates?

a. Both OEMs and wireless carriers are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates.
b. Because many of the OEMs had modified Android, they are reluctant to distribute updates that could potentially conflict with their changes.
c. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks.
d. Because OEMs and wireless carriers want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely.

A

c. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the process of identifying the geographical location of a mobile device?

a. Geotracking
b. Geolocation
c. geoID
d. Geomonitoring

A

b. Geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of these is NOT a risk of connecting a mobile device to a public network?

a. Public networks are beyond the control of the employee’s organization.
b. Replay attacks can occur on public networks.
c. Public networks may be susceptible to man-in-the-middle attacks.
d. Public networks are faster than local networks and can spread malware more quickly to mobile devices.

A

d. Public networks are faster than local networks and can spread malware more quickly to mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo’s opinion regarding its security. What would Paavo tell him about USB OTG security?

a. USB OTG uses strong security and the executive should have no concerns.
b. Subnotebooks do not support USB OTG.
c. An unsecured mobile device could infect other tethered mobile devices or the corporate network.
d. Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

A

d. Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A friend of Ukrit told him that he has just downloaded and installed an app that allows him to circumvent the built-in limitations on his Apple iOS smartphone. What is this called?

a. Rooting
b. Sideloading
c. Jailbreaking
d. Ducking

A

c. Jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following technologies provides for pictures, video, or audio to be included in text messages?

a. MMS
b. QR
c. SMS
d. ANT

A

a. MMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What prevents a mobile device from being used until the user enters the correct passcode?

a. Swipe identifier (SW-ID)
b. Screen lock
c. Screen timeout
d. Touch swipe

A

b. Screen lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. Which configuration setting is enabled on Gaetan’s mobile device?

a. Reset to factory settings
b. Extend lockout period
c. Enable high security
d. :Lock device

A

a. Reset to factory settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does containerization do?

a. It splits operating system functions only on specific brands of mobile devices.
b. It places all keys in a special vault.
c. It slows down a mobile device to half speed.
d. It separates personal data from corporate data.

A

d. It separates personal data from corporate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What allows a device to be managed remotely?

a. Mobile device management (MDM)
b. Mobile application management (MAM)
c. Mobile resource management (MRM)
d. Mobile wrapper management (MWM)

A

a. Mobile device management (MDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of these is NOT a security feature for locating a lost or stolen mobile device?

a. Remote lockout
b. Last known good configuration
c. Alarm
d. Thief picture

A

b. Last known good configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What enforces the location in which an app can function by tracking the location of the mobile device?

a. Location resource management
b. Geofencing
c. GPS tagging
d. Graphical Management Tracking (GMT)

A

b. Geofencing

17
Q

Which of these is considered the strongest type of passcode to use on a mobile device?

a. Password
b. PIN
c. Fingerprint swipe
d. Draw connecting dots pattern

A

a. Password

18
Q

Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regarding a serious malware incident. What technology will she use?

a. MCM
b. COPE
c. MAM
d. Push notification services

A

d. Push notification services

19
Q

Which tool manages the distribution and control of apps?

a. MAM
b. MDM
c. MCM
d. MFM

A

a. MAM

20
Q

Which type of OS is typically found on an embedded system?

a. SoC
b. RTOS
c. OTG
d. COPE

A

b. RTOS

21
Q

Select the option that represents a wearable technology.

a) iphone
b) google chromebook
c) google glass
d) android

A

c) google glass

22
Q

Describe some of the risks associated with using mobile devices in an enterprise environment.

A

There are several vulnerabilties inherent to mobile devices. The mobile device vulnerabilities include physical security, limited firmware updates, location tracking, and unauthorized recording.

In terms of physical security, the portability of mobile devices allows them to be take beyond the enterpriss’s normal physical perimeter. This allows them to be lost or stolen or taken over by bad actors.

In terms of limited firmware updates, the domination of Android makes it very difficult to distribute security updates to the devices through the wireless carriers. The open nature of the Android allows modifications to be made that Google cannot take in account.

In terms of location tracking, it makes it easier for enterprise users to be target by bad actors.

In terms of unauthorized recording, hackers have been able to inject malware into phones which provide them access to audio and video services. This makes it possible for a hacker to record sensitive information given out in private meetings.

23
Q

What type of management system below can help distribute and manage public corporate apps?

a) total device management
b) mobile device management
c) extended device management
d) wireless device management

A

b) mobile device management

24
Q

Which of the following is not a benefit of using COYD enterprise deployment model for an enterprise?

a) less oversight
b) increased employee performance
c) increase internal service
d) management flexibility

A

c) increase internal service

25
Q

Some mobile devices can be configured so that the device automatically unlocks and stays unlocked until a specific action occurs.

(T/F)

A

True

26
Q

What can be enabled to prevetn a mobile device from being used until a user enters the correct passcode, such as pin or password.?

a) enable a lock screen
b) enable a challenge-response screen
c) enable a smart card
d) enable a sleep time setting

A

a) enable a lock screen

27
Q

Teithering may allow an unsecured mobile device to infect other tethered mobile devices or the corporate network.

(T/F)

A

True

28
Q

What systems control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly contorl devices such as valves, pumps, and motors without the need for human intervention?

a) SCADA
b) ICS
c) RTOS
d) HVAC

A

b) ICS

29
Q

How could an administrator initially manage applications on mobile devices using a technqiue called “app wrapping”?

a) extended application management
b) mobile application management
c) cloud application management
d) remote application management

A

b) mobile application management