Module 5 Flashcards

1
Q

What are examples of different types of mobile devices?

A
  • Tablets
  • Smartphones
  • Wearables
  • Portable Computers (laptops)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 different methods for connecting mobile devices to networks?

A
  1. Cellular: A communications network in which the coverage area is divided into hexagon-shaped cells. (transmitter/cell tower transmits the signals)
  2. Wi-Fi
  3. Infrared: Light that is next to visible light on the light spectrum and was once used for data communications. (rarely used due to slowness)
  4. USB connections: A port on mobile devices used for data transfer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 5 different enterprise deployment models regarding mobile devices for employees?

A
  1. Bring your own Deice (BYOD): Employees use their own device
  2. Corporate owned, personally enabled (COPE): Employees choose from a selection of company-approved devices
  3. Choose your own device (CYOD): Employees choose from limited selection of approved devices but pay the upfront cost of device while business owns the contract
  4. Virtual desktop infrastructure (VDI): Stores sensitive applications and data on a remote server accessed through a smartphone
  5. Corporate Owned: Device is purchased and owned by the enterprise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 main security risks associated with mobile devices?

A
  1. Mobile device vulnerabilities: physical security (theft), limited updates, location tracking (GPS, GPS Tagging)
  2. Connection Vulnerabilities: Tethering, USB On-the-Go, Malicious USB cable, Hotspots
  3. Accessing Untrusted Content: via jailbreaking or rooting, third-party app store, custom firmware, SMS MMS and RCS, QR codes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 4 different configurations that should be considered when setting up a mobile device for use?

A
  1. Use strong authentication: Passcode, PIN, Screen lock
  2. Managing encryption: full disk encryption (on mobile devices)
  3. Segmenting storage: Storage segmentation (separating business from personal data), containerization (storage is separated into containers)
  4. enabling loss or theft services: (alarm, last known location, locate, remote lockout, thief picture), remote wipe
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 4 different support tools that can facilitate the management of mobile devices in an enterprise?

A
  1. Mobile Device Management (MDM): Tools that allow a device to be managed remotely by an organization.
  2. Mobile Application Management (MAM): Tools that are used for distributing and controlling access to apps on mobile devices.
  3. Mobile Content Management (MCM): A system that is tuned to provide content management to mobile devices used by employees in an enterprise.
  4. Unified Endpoint Management (UEM): A group or class of software tools has a single management interface for mobile devices as well as computer devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Embedded system?

A

Computer hardware and software contained within a larger system that is designed for a specific function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two different hardware components that can be used to create your own specialized devices?

A
  • Rasberry Pi: A low-cost credit-card-sized computer motherboard.
  • Arduino Board: A controller for other devices (not as powerful)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a field-programmable gate array (FPGA)?

A
  • A hardware integrated circuit (IC) that can be programmed by the user.
    • Used in Rasberry Pi and Arduino for customizability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is system on a chip (SoC)?

A
  • A single microprocessor chip on which all the necessary hardware components are contained.
    • Often uses real-time operating system (RTOS) (os designed specifically for SoC that processes high amount of data at once for quick decision making)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some examples of a specialized systems?

A
  • smart meters: Digital meters that measure the amount of utilities consumed. Gives automatic meter readings as opposed to an analog meter
    • Other examples: Medical systems, aircraft, vehicles
  • heating, ventilation, and air conditioning (HVAC): Environmental systems that provide and regulate heating and cooling.
  • *multifunctional printer (MFP):** A device that combines the functions of a printer, copier, scanner, and fax machine.
  • Unmanned aerial vehicle (UAV)/Drones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Industrial control systems (ICSs)? What are ICSs managed by?

A
  • Systems that control locally or at remote locations by collecting, monitoring, and processing real-time data to control machines.
    • Managed by a supervisory control and data acquisition (SCADA), which controls the ICSs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is voice over IP (VoIP)?

A

A technology that uses a data-based IP network to add digital voice clients and new voice applications onto the IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Internet of Things (IoT)?

A
  • Connecting any device to the Internet for the purpose of sending and receiving data to be acted upon.
    • Devices that wouldn’t be considered computing devices, such as wearables, refrigerator, etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly