18 Flashcards
Which of the following answers refers to a broadband cellular network technology?
4G/5G
A 2.4/5.0 GHz frequency range wireless network technology implemented in the IEEE 802.11 series of standards is commonly referred to as
WiFi
A popular, 2.4 GHz short-range wireless technology used for connecting various personal devices in a WPAN is known as:
Bluetooth
Which of the following answers refers to a security feature used in Bluetooth device pairing?
PIN
A very short-range communication method where a wireless signal is sent between two devices that are touching or nearly touching each other is a characteristic feature of:
** NFC **
Near Field Communication (NFC)
Which of the answers listed below refers to a short distance, line-of-sight technology used for example in home remote controls?
** IR **
Infrared (IR)
Which of the following would prevent using a mobile device for data exfiltration via cable connection?
DLP
A mobile device’s built-in functionality enabling the usage of locator applications is called:
GPS
Which type of software enables a centralized administration of mobile devices?
MDM
Which of the following facilitates the enforcement of mobile device policies and procedures?
MDM
Which of the following allows to erase data on a lost or stolen mobile device?
Remote wipe
A type of technology that provides control over the usage of a mobile device within a designated area is referred to as:
** Geofencing **
Geofencing creates a virtual geographical boundary that triggers a marketing action to a mobile device when a user enters or exits that boundary. An administrator or developer first establishes a virtual boundary around a certain location in GPS- or RFID-enabled software.
A user interface element controlling access to a mobile device after the device is powered on is called:
Screen lock
The term “Push notification” is used to describe information delivery from a server to a client performed without a specific request from the client.
True
Context-aware authentication strengthens the authentication process by requiring the standard user credentials (username and password) to be coupled with additional items that can be used in the authentication process, such as:
- Connection type used
- Time of the day login patterns
- Geolocation
- Type of device used
- IP address
All of the above