Module 5 Flashcards
Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki’s advice regarding its. Which of the following would Enki NOT tell him?
A device connected via USB OTG can function as a host.
Connecting a mobile device to an infected computer using USB OTG could allow malware to be sent to that device.
A device connected via USB OTG can function as a peripheral for external media access.
USB OTG is only available for connecting Android devices to a subnotebook.
USB OTG is only available for connecting Android devices to a subnotebook.
USB OTG is available for both Android and Apple devices and can connect to a variety of different devices besides just a subnotebook.
What prevents a mobile device from being used until the user enters the correct passcode?
Screen timeout
Touch swipe
Screen lock
Swipe identifier (SW-ID)
A screen lock prevents the mobile device from being accessed until the user enters the correct passcode, permitting access. Lock screens should be configured so that whenever the device is turned on or is inactive for a period, the user must enter the passcode.
What allows a device to be managed remotely?
Mobile application management (MAM)
Mobile device management (MDM)
Mobile resource management (MRM)
Mobile wrapper management (MWM)
Mobile device management (MDM) tools allow a device to be managed remotely by an organization. MDM typically involves a server component, which sends out management commands to the mobile devices, and a client component, which runs on the mobile device to receive and implement the management commands. An administrator can then perform OTA updates or configuration changes to one device, groups of devices, or all devices.
Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates?
- OEMs are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates.
- Because many of the OEMs have modified Android, they are reluctant to distribute updates that could potentially conflict with their changes.
- Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks.
- Because OEMs want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely.
Because many of the OEMs have modified Android, they are reluctant to distribute updates that could potentially conflict with their changes.
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?
BYOD
Corporate owned
CYOD
COPE
CYOD
-Employees choose from a limited selection of approved devices but the employee pays the upfront cost of the device while the business owns the contract.
Alpha Tech started a charitable competition in which every team is asked to submit a proposal for a public health contract asking for a new viral transmission mitigation app.
Which team has selected the correct option?
Team A has selected MBSN.
Team B has selected BAN.
Team D has selected IR sensors.
Team C has selected ABSN.
IoT BAN is a wireless network of wearable computing devices. Sensors that continuously monitor body temperature are being proposed to help stem the transmission of viruses among humans. The sensors could help shut down emerging viruses before a pandemic can take hold.
Photoplethysmography uses which type of light to measure heart rate on a wearable device?
Green
Red
Infrared
Ultraviolet
Green LED lights are used when the wearer is exercising by flashing green light onto the wrist hundreds of times per second. Human blood absorbs the green light. The heart rate can be determined by measuring the changes found in the green light absorption, and this method is called photoplethysmography.
In which of the following mobile device connectivity methods are transmitters connected through a mobile telecommunication switching office (MTSO) that controls all of the transmitters in the cellular network and serves as the link between the cellular network and the wired telephone world?
Wi-Fi
Cellular
Infrared
Bluetooth
Many mobile devices rely on cellular telephony for connectivity. A cellular telephony network’s coverage area is divided into hexagon-shaped cells; in a typical city, the cells measure 10 square miles (26 square kilometers). At the center of each cell is a transmitter that mobile devices in the cell use to send and receive signals. The transmitters are connected through a mobile telecommunications switching office (MTSO) that controls all transmitters in the cellular network and serves as the link between the cellular network and the wired telephone world.
Which alert utility can identify theft in a smart meter?
Servicing
Emergency communication
Tamper protection
Meter readings
Tamper protection can alert a utility in the event of tampering or theft.
Zyan works for ABC Technology. The enterprise wants to provide smartphones to all its employees. They can choose from a limited list of approved mobile devices. But they need to pay for the device themselves. The company will pay them a monthly stipend. Which deployment method should Zyan suggest to meet his company’s needs?
Corporate-owned device (COD)
Choose your own device (CYOD)
Virtual desktop infrastructure (VDI)
Corporate-owned personally enabled (COPE)
In choose your own device (CYOD), employees choose from a limited selection of approved devices but pay the upfront cost of the device while the business owns the contract.
Dan uses his personal laptop for writing the script for an upcoming high-budget, highly anticipated movie. To keep the script private, he decided not to connect his laptop to any network and updated his system with the latest virus definitions and security patches. Which of the following is Dan’s laptop still vulnerable to?
DDoS
DNS poisoning
Malicious USB
Cross-site scripting
Dan’s laptop is still vulnerable to a malicious USB. A USB cable can be embedded with a Wi-Fi controller that can receive commands from nearby devices to send malicious commands to the connected mobile device.
Which of the following sensors help generate security alerts to physicians regarding patient health?
Accelerometer
BAN
Proximity sensor
SoC
A body area network (BAN) can monitor electrocardiogram (EKG) impulses, blood pressure, glucose, and other human biological functions and alert physicians to any anomalies.
Which of the following devices is similar to Raspberry Pi?
Real-time operating system
FPGA
SoC
Arduino
Arduino
A device similar to the Raspberry Pi is the Arduino. Unlike the Raspberry Pi, which can function as a complete computer, the Arduino is designed to control other devices; it has an 8-bit microcontroller, compared to the 64-bit microprocessor on the Raspberry Pi, a limited amount of
RAM, and no operating system.
Marcus is an information security architect at a product-based IT firm. He is responsible for developing policies for the most-secure mobile device enterprise-deploying model. The company will decide the level of choice and freedom for employees. Employees are supplied company-chosen and paid-for devices that they can use for both professional and personal activities. This action is performed under which enterprise deployment model?
Corporate-owned device (COD)
Corporate-owned, personally enabled (COPE)
Bring your own device (BYOD)
Choose your own device (CYOD)
In COPE, employees are supplied the device chosen and paid for by the company, but they can also use it for personal activities.
John has been appointed as a product manager at a large mobile device manufacturing company. He is designing the core features included in their flagship mobile device that will be launched during the holiday shopping season. Which of the following features should he primarily include?
Digital camera
Microphone
Data synchronization with a remote server or separate device
Global positioning system (GPS)
Data synchronization capabilities with a remote server or a separate computer/mobile device are a core feature of mobile devices.