Comptia+ Chapter 6 Flashcards

1
Q

Cellular

A

A communications network in which the coverage area is divided into hexagon-shaped cells

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bring your own device(BYOD)

A

Allows users to use their own personal mobile devices for business purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Corporate owned, personally enabled (COPE)

A

Employees choose from a selection of company approved devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Choose your own device (CYOD)

A

Employees choose from a limited selection of approved devices, but the employees pay the upfront cost of the device while the business owns the contract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Jailbreaking

A

Circumventing the installed built-in limitations on Apple iOS devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sideloading

A

Downloading unofficial and unapproved apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hardening mobile devices

A

Steps that can be taken to make mobile devices more resilient to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Embedded system

A

Computer hardware and software contained within a larger system that is designed for a specific function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Real-time operating system (RTOS)

A

An operating system that is specifically designed for an SoC and an embedded system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

High availability

A

An RTOS that is tuned to accommodate very high volumes of data that must be immediately processed for critical decision making. Also, making servers always accessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardening RTOS

A

Steps that can be taken to make a real-time operating system more resilient to attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Industrial control systems (ICSs)

A

Systems that control locally or at remote locations by collecting, monitoring, and processing real-time data to control machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Supervisory control and data acquisition (SCADA)

A

A system that controls multiple industrial control systems (ICS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet of Things (IoT)

A

Connecting any device to the internet for the purpose of sending and receiving data to be acted upon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Power

A

A security constraint in which a system lacks sufficient power to perform strong security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compute

A

A security constraint in which a device’s small size results in low processing capabilities to incorporate comprehensive security measures.

17
Q

Inability to patch

A

A security constraint in which the capacity is absent for updating to address exposed security vulnerabilities.

18
Q

Patch availability

A

A security constraint in which manufacturers do not produce patches for devices

19
Q

Cost

A

A security constraint in which making products as inexpensive as possible results in leaving out security protections. Also, a disadvantage of automation is that it is more expensive.

20
Q

Ease of recovery

A

A security constraint in which a compromise sensor may have difficulty recovering to its normal state following an attack.

21
Q

Responsiveness

A

A security constraint in which IoT devices that require immediate responsiveness to inputs are crippled by adding security features.

22
Q

Scalability

A

A security constraint in which increasing the size and scope of an IoT device introduces new vulnerabilities.

23
Q

Ease of deployment

A

A security constraint in which an accelerated rollout of devices at a faster pace prevents them from being secured.

24
Q

Risk transference

A

A security constraint in which shifting risk and responsibility from one area of oversight to another results in security vulnerabilities.

25
Availability
A security constraint in which ensuring timely and reliable access to devices can be hampered by the constraints.
26
Input validation
A coding technique for accounting for errors.
27
Static code analysis
Analyzing and testing software from a security perspective before the source code is compiled.
28
Dynamic code analysis
Examining code after the source code is compiled, and when all components are integrated and running