Mobile Devices Flashcards
Which of the following is a weakness of cellular technology?
Multiple vendors in a nationwide network
Less availability in rural areas
Strong signals in areas of reasonable population
Less availability in rural areas
A weakness of cellular technology is that it is less available in rural areas
hat frequency spectrum does Wi-Fi use?
- 9 Hz
- 7 GHz
5 GHz
5 GHz
Wi-Fi uses both 2.4-GHz and 5-GHz frequency spectrums
What is the most common scenario for the use of satellite communications (SATCOM)?
In densely populated areas
Rural and remote areas or at sea
As a backup for cell phone coverage
Rural and remote areas or at sea
SATCOM usage is most common in rural and remote areas or at sea, where other technologies are not available
What frequency spectrum does Bluetooth use?
- 7 GHz
- 4 GHz
5 GHz
2.4 GHz
Bluetooth uses the 2.4-GHz frequency spectrum
Which of the following is the data rate for Bluetooth 4.0?
768 Kbps
3 Mbps
24 Mbps
24 Mbps
24 Mbps is the data rate for Bluetooth 4.0
Which of the following are the three modes supported by Bluetooth 4.0?
Classic, low speed, high energy
Enhanced data rate, backward compatible, high energy
Classic, high speed, Low Energy
Classic, high speed, Low Energy
The three modes supported by Bluetooth 4.0 are classic, high speed, and Low Energy
What mechanism does Bluetooth use to establish a trust relationship?
Pairing
Kerberos
PKI
Pairing
Bluetooth uses pairing to establish a trust relationship
What is the primary use of Near Field Communication (NFC)?
Establish radio communications over a short proximity
Communication in sparsely populated areas
Long-distance connectivity
Establish radio communications over a short proximity
The primary use of NFC is to establish radio communications over a short proximity
Which of the following correctly describes ANT?
It operates in the 5-GHz spectrum.
It encrypts HTTP traffic.
It functions well in the crowded 2.4-GHz spectrum.
It functions well in the crowded 2.4-GHz spectrum.
ANT functions well in the crowded 2.4-GHz spectrum
What is a disadvantage of infrared (IR) technology?
It has a high data rate.
It cannot penetrate solid objects.
It can penetrate walls.
It cannot penetrate solid objects.
A disadvantage of IR technology is that it cannot penetrate solid objects
What is the main security concern with Universal Serial Bus (USB) technology?
It connects to cell phones for easy charging.
It uses proprietary encryption.
It automounts and acts like a hard drive attached to the computer.
It automounts and acts like a hard drive attached to the computer.
The main security concern with USB technology is that it automounts and acts like a hard drive attached to the computer
Which of the following is not an element of a good Mobile Device Management (MDM) policy?
The ability to decrypt data on the device
The ability to lock the device if it is lost or stolen
The ability to wipe the device automatically after several failed login attempts
The ability to decrypt data on the device
Decryption of data on the device is not an element of a good MDM policy
Which of the following correctly defines Mobile Device Management (MDM)?
A marketing term for commonly employed protections for mobile devices
The ability to lock mobile devices after a period of inactivity
A method of locking devices with a strong password
A marketing term for commonly employed protections for mobile devices
MDM is a marketing term for commonly employed protections for mobile devices
Why is it important to establish policies governing remote wiping of mobile devices?
Mobile devices are more easily secured.
Thieves cannot decrypt mobile devices.
They are more susceptible to loss than other devices.
They are more susceptible to loss than other devices.
It is important to establish policies governing remote wiping of mobile devices because they are more susceptible to loss than other devices
What is the purpose of geofencing?
It can be used to remotely wipe a lost device.
It makes securing the mobile device simpler.
It enables devices to be recognized by location and have actions taken.
It enables devices to be recognized by location and have actions taken.
The purpose of geofencing is to enable devices to be recognized by location and have actions taken