Mobile Devices Flashcards

1
Q

Which of the following is a weakness of cellular technology?

Multiple vendors in a nationwide network

Less availability in rural areas

Strong signals in areas of reasonable population

A

Less availability in rural areas

A weakness of cellular technology is that it is less available in rural areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

hat frequency spectrum does Wi-Fi use?

  1. 9 Hz
  2. 7 GHz

5 GHz

A

5 GHz

Wi-Fi uses both 2.4-GHz and 5-GHz frequency spectrums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the most common scenario for the use of satellite communications (SATCOM)?

In densely populated areas

Rural and remote areas or at sea

As a backup for cell phone coverage

A

Rural and remote areas or at sea

SATCOM usage is most common in rural and remote areas or at sea, where other technologies are not available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What frequency spectrum does Bluetooth use?

  1. 7 GHz
  2. 4 GHz

5 GHz

A

2.4 GHz

Bluetooth uses the 2.4-GHz frequency spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is the data rate for Bluetooth 4.0?

768 Kbps

3 Mbps

24 Mbps

A

24 Mbps

24 Mbps is the data rate for Bluetooth 4.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following are the three modes supported by Bluetooth 4.0?

Classic, low speed, high energy

Enhanced data rate, backward compatible, high energy

Classic, high speed, Low Energy

A

Classic, high speed, Low Energy

The three modes supported by Bluetooth 4.0 are classic, high speed, and Low Energy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What mechanism does Bluetooth use to establish a trust relationship?

Pairing

Kerberos

PKI

A

Pairing

Bluetooth uses pairing to establish a trust relationship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary use of Near Field Communication (NFC)?

Establish radio communications over a short proximity

Communication in sparsely populated areas

Long-distance connectivity

A

Establish radio communications over a short proximity

The primary use of NFC is to establish radio communications over a short proximity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following correctly describes ANT?

It operates in the 5-GHz spectrum.

It encrypts HTTP traffic.

It functions well in the crowded 2.4-GHz spectrum.

A

It functions well in the crowded 2.4-GHz spectrum.

ANT functions well in the crowded 2.4-GHz spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a disadvantage of infrared (IR) technology?

It has a high data rate.

It cannot penetrate solid objects.

It can penetrate walls.

A

It cannot penetrate solid objects.

A disadvantage of IR technology is that it cannot penetrate solid objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the main security concern with Universal Serial Bus (USB) technology?

It connects to cell phones for easy charging.

It uses proprietary encryption.

It automounts and acts like a hard drive attached to the computer.

A

It automounts and acts like a hard drive attached to the computer.

The main security concern with USB technology is that it automounts and acts like a hard drive attached to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is not an element of a good Mobile Device Management (MDM) policy?

The ability to decrypt data on the device

The ability to lock the device if it is lost or stolen

The ability to wipe the device automatically after several failed login attempts

A

The ability to decrypt data on the device

Decryption of data on the device is not an element of a good MDM policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following correctly defines Mobile Device Management (MDM)?

A marketing term for commonly employed protections for mobile devices

The ability to lock mobile devices after a period of inactivity

A method of locking devices with a strong password

A

A marketing term for commonly employed protections for mobile devices

MDM is a marketing term for commonly employed protections for mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is it important to establish policies governing remote wiping of mobile devices?

Mobile devices are more easily secured.

Thieves cannot decrypt mobile devices.

They are more susceptible to loss than other devices.

A

They are more susceptible to loss than other devices.

It is important to establish policies governing remote wiping of mobile devices because they are more susceptible to loss than other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of geofencing?

It can be used to remotely wipe a lost device.

It makes securing the mobile device simpler.

It enables devices to be recognized by location and have actions taken.

A

It enables devices to be recognized by location and have actions taken.

The purpose of geofencing is to enable devices to be recognized by location and have actions taken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly