Mobile Networking Flashcards

1
Q

first group of networking technologies applied to mobile devices, it relied on TDMA and introduced SIM cards; considered 2G technology

A

Global System for Mobile Communications (GSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

type of multiplexing where mutliple users could share a channel at seemingly the same time by switching between users so fast to appear unnoticable

A

time-division multiple access (TDMA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

one of the last GMS standards, it offered data speed of up to 384 Kbps

A

Enchanced Data rates for GSM Evolution (EDGE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

mobile networking technology that used a spread spectrum form of transmission, having users assigned different frequencies rather than splitting a channel into time slices; lacked SIM cards

A

Code-division multiple access (CDMA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

final 3G standard of mobile networking technologies, it provided theoretical speeds of up to 168 Mbps, though rarely exceeded 10 Mbps; it supported the IMT-2000 standard with higher speeds, support for full-time Internet connections, and other functions

A

Enchanced High-Speed Packet Access (HSPA+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

mobile networking technology marketed as 4G technology, it features speeds up to 300 Mbps download and 75 Mbps upload, and it uses SIM cards

A

Long Term Evolution (LTE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

security mode for Bluetooth devices that prevents the device from being visible unless the mode is turned on, and that for only a limited time

A

discovery/discoverable mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

process of sending unsolicited message to another Bluetooth user

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

process of using a weakness in the Bluetooth standard to steal information from other Bluetooth devices

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bluetooth security vulnerabilities published in 2017

A

BlueBorne

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

low speed, short range technology designed for monetary transactions; usually consists of an tag that stores private data and a reader; uses the 13.56 MHz band; can limit connection as little as 5 cm

A

Near field communication (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

technology standards similar to NFC that uses a range of frequency bands from 120 KHz to 10 GHz; has broader applications than NFC; must be within 1 meter, has weak to no encryption, and used often in tags

A

radio-frequency identification (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

communication that consists of an infrared light-emitting device and another device that reads the code; used often in remotes

A

Infrared (IR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

infrared transmitter than can emulate any IR remote

A

IR blaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

low speed, low powered communication technology similar to NFC; used in situations where it can go long periods of time without transmitting data, require low power, and is not needed to transmit a lot of data; used in heart-rate monitors; not found in Apple phones and only in some Android phones; encrypted with AES

A

Adaptive Network Technology (ANT+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

process of controlling lights, thermostats, cameras, and even washers remotely

A

home automation

17
Q

deployment model where employees’ own mobile devices are used by the corporation; requires tight controls and separation of personal/corporate data

A

bring your own device (BYOD)

18
Q

deployment model where the corporation owns all devices and is responsible for the maintenance of them; very strict in what is put on them

A

corporate-owned business only (COBO)

19
Q

deployment model where the corporation owns all devices and is responsible for the maintenance of them; employees are provided a list of whitelisted applications that they may install

A

corporate-owned, personally-enabled (COPE)

20
Q

deployment model where employees are provided a choice from a catalog of mobile devices; company owns the device, but employee can install their own apps

A

choose your own device (CYOD)

21
Q

process of making sure new mobile devices in an company’s infrastructure are secure and safe to use inside

A

on-boarding

22
Q

process of making sure that mobile devices that leave a company’s control no longer store proprietary apps or data

A

off-boarding

23
Q

process of using a mobile device’s GPS capabilities and networking capabliities to set constraints on where it can be used

A

geofencing