Chapter 21 terms and topics Flashcards

1
Q

Policy that allows employees in an organization to use their personally owned devices for work-related activities.

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An employee provisioning model that allows employees to select a mobile device from a limited number of options.

A

CYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Deployment model, employees are supplied a mobile device that is chosen and paid for by the organization, but are given permission to use it for personal activities.

A

COPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Company supplies employees with a mobile device that is restricted to company-only-use.

A

COBO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security feature that allows a network admin or device owner to send a command that remotely deletes data from a computing device.

A

Remote Wiping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security feature that locks up the device after a certain period of time of inactivity.

A

Remote Locking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The method of installing, updating, and managing the applications through a system.

A

Application Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Original USB Speed is

A

480 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

USB 3 speed is

A

5 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

USB 3.1 speed is

A

10 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

USB 3.2 speed is

A

20 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

USB 4 speed is

A

40 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A marketing term for a collective set of commonly employed protection elements associated with mobile devices.

A

MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What six items should an MDM policy contain?

A

Device locking, Encryption, automatic device locking after inactivity period, remote lock, remote wipe, and device wipe after certain failed login attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Power-conserving variant of PAN technology.

A

Bluetooth Smart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When a hacker intercepts, deletes, or modifies data that is transmitted between two devices.

A

Eavesdropping Attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A man-in-the-middle attack that occurs when a bad actor intercepts a secure network communication and fraudulently delays or resends it to misdirect the receiver into doing what the hacker wants.

A

Replay Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Four different types of attacks that can be performed against RFID systems, not including replay or eavesdropping attacks.

A

Attacks against Chips and Readers.
Communication channel attack between the device and the reader.
Attack against the reader and back-end system.
And Radio Frequencies attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The use of GPS and/or RFID technology to create a virtual fence around a particular location.

A

Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Using GPS to track a device’s location.

A

Geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Using geographic coordinates to media based on the location of a mobile device.

A

Geotagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the advantages and disadvantages of Bluetooth 5?

A

Uses a different frequency spectrum, requiring new hardware and limiting backward compatibility, but it is designed for local networks of the future with low power consumption, inexpensive hardware and callable data rates versus range considerations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What types of devices support sideloading?

A

Only Android mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a disadvantage of using cellular communication

A

Gaps in cellular service still exist.

25
Q

Virtual Technology that creates and manages virtual desktop environments on a centralized server.

A

VDI

26
Q

What technologies use point-to-point?

A

Bluetooth and USB

27
Q

What technologies use Point-to-multipoint?

A

Radio based and networked systems.

28
Q

What types of systems use NFC?

A

Smart phones, and mobile pay systems.

29
Q

What USB connector is reversible?

A

USB-C.

30
Q

What is the purpose of UEM?

A

To extend the function set from MDM to encompass all endpoint devices.

31
Q

Dividing the device into a series of containers-one container holding work-related materials, the other personal.

A

Containerization

32
Q

Separates personal and work data but represents a logical separate of the storage in the unit.

A

Storage Segmentation

33
Q

What frequency band is used by Bluetooth?

A

2.4 GHz

34
Q

What are the modes used by Bluetooth 4.0?

A

Classic, high-speed, and Low Energy.

35
Q

What frequency bands are used by Wi-Fi?

A

2.4 and 5-GHz.

36
Q

What frequency band is used by GPS?

A

6-GHz

37
Q

The use of contextual information to make the authentication decision as to whether to permit the user access to the requested resource.

A

Context-aware authentication

38
Q

Text only message service between mobile devices.

A

SMS

39
Q

Standard way to send messages that include multimedia content to and from mobile devices.

A

MMS

40
Q

Operates between mobile device and the carrier and requires compatible apps on both ends of the communication.

A

RCS

41
Q

How to disable Autorun on a Windows 10 computer:

A

Go to Start, then Settings, Devices, Turn off Auto play.

42
Q

The process of programming the device to sever itself from the carrier.

A

Carrier Unlocking

43
Q

Are biometrics a good security method for mobile devices

A

No, cause facial and print scanning can easily be bypassed.

44
Q

What version of Bluetooth is practically extinct

A

Bluetooth 1 series.

45
Q

What is the purpose of push notification services?

A

To deliver information to mobile devices without a specific request from the device.

46
Q

An extension of USB technology that allows direct connection of mobile devices to other host-based platforms.

A

USB OTG

47
Q

A device process by which OS controls are bypassed, and this is the term frequently used for Android devices.

A

Rooting

48
Q

A process by which the user escalates their privilege level, bypassing the operating system’s controls and limitations.

A

Jailbreaking

49
Q

A security solution for Android that identifies and addresses critical gaps in security.

A

SEAndroid

50
Q

The encryption of all data on a disk drive.

A

FDE

51
Q

What is the difference between Wi-Fi Ad Hoc and Wi-Fi Direct?

A

In an Ad Hoc network, multiple devices can communicate with each other, and other devices as well. Direct is where two Wi-Fi devices connect to each other via single hop connection.

52
Q

What is the purpose of tethering?

A

Sharing network access.

53
Q

Set of actions used to control content issues, including what content is available and to what apps, on mobile devices.

A

Content Management

54
Q

How is IR technology used? What are its disadvantages?

A

It’s used in remote control devices, and wireless devices that exchange data through IR. Its signal speed is slow and solid objects can block IR signals to the receiver.

55
Q

A software that enables IT administrators to manage and secure enterprise applications on end-user smartphones and tablets.

A

MAM

56
Q

A hardware security module that allows you a portable means of secure storage for a wide range of cryptographic keys.

A

MicroSD HSM

57
Q

What is the purpose of USB OTG?

A

To have a wireless connection through a USB enabled device.

58
Q

Why are gesture-based- swipes not considered secure?

A

Because the screen of the mobile device can show the patterns from the user’s fingerprints.