19 Flashcards
Installing mobile apps from websites and app stores other than the official marketplaces is referred to as:
** Sideloading **
The process of installing applications on a device without the use of official software distribution channels
Allowing “Unknown Sources” in Android Security Settings enables:
** Sideloading **
The process of installing applications on a device without the use of official software distribution channels
Which of the following terms refers to a modified mobile device equipped with software features that were not originally designed by the device manufacturer?
Custom firmware
The practice of modifying a mobile device’s operation in such a way that it can be used with any service provider is called:
Carrier unlocking
Mobile device updates delivered over a wireless connection are known as:
** OTA **
Mobile device updates delivered over a wireless connection are typically referred to as “Over-the-Air” (OTA) updates.
Which of the following answers refers to a technology designated as a successor to SMS and MMS?
** RCS **
The technology designated as a successor to SMS and MMS is RCS, which stands for Rich Communication Services. RCS is designed to provide a more feature-rich and interactive messaging experience compared to traditional SMS and MMS messaging.
Which technology enables establishing direct communication links between two USB devices?
** OTG **
OTG, which stands for USB On-The-Go
Which of the following answers refers to a privacy-related security risk connected with public sharing of pictures taken with smartphones?
Weak passwords
Which technology enables establishing direct communication links between two wireless devices without an intermediary Wireless Access Point (WAP)?
WiFi Direct
A mobile device’s capability to share its Internet connection with other devices is referred to as
Tethering
The term “Mobile hotspot” refers to a type of WLAN that enables network access through a mobile device that acts as a portable WAP.
True
A mobile device deployment model that allows employees to use private mobile devices for accessing company’s restricted data and applications is known as:
** BOYD **
Bring Your Own Device (BYOD)
In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?
** COPE **
corporate-owned, personally-enabled
A mobile device deployment model in which employees select devices for work-related tasks from a company-approved device list is known as:
** CYOD **
choose your own device
In which of the mobile device deployment models a mobile device acts as a terminal for accessing data and applications hosted on a remote server?
** VDI **
Virtual desktop infrastructure (VDI)
Which of the following answers refers to a security policy enforcement software tool or service placed between cloud service users and cloud applications?
** CASB **
A Cloud Access Security Broker (CASB)
A Secure Web Gateway (SWG) is a software component or a hardware device designed to prevent unauthorized traffic from entering an internal network of an organization. An SWG implementation may include various security services, such as packet filtering, URL/content filtering, malware inspection, application controls, Acceptable Use Policy (AUP) enforcement, or Data Loss Prevention (DLP).
True
Which of the following answers refers to a trusted third-party service for validating user identity in a federated identity system?
** IdP **
An identity provider (IdP) is a system that creates, stores, and manages digital identities. The IdP can either directly authenticate the user or can provide authentication services to third-party service providers (apps, websites, or other digital services)
Which of the following can be used to verify the identity of a client while establishing a session over TCP port 22? (Select all that apply)
- Username and password
- SSH Key
A general characteristics of a standard user account is that it provides access to basic system resources but does not allow the user to make system changes.
True
Which type of user account violates the concept of non-repudiation?
Shared account
In MS Windows environments, Guest account is an account for users who do not have a permanent account on a Windows computer or domain. People using this type of account cannot install software or hardware, change settings, create passwords, or access protected files and folders. However, because the Guest account allows the user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn’t being used.
True
Which of the following account types is not designed for an end user use?
Service account
The two factors that are considered important for creating strong passwords are: (Select 2 answers)
- Password length
- Password complexity
A strong password that meets the password complexity requirement should contain: (Select the best answer)
A combination of characters from at least 3 character groups