Quiz 10 Flashcards
Mobile devices with global positioning system (GPS) abilities typically make use of: T/F
False
Virtual machines store sensitive applications and data on a remote server that is accessed through a smartphone. T/F
False
Some mobile devices can be configured so that the device automatically unlocks and stays unlocked until a specific action occurs. T/F
True
The greatest asset of a mobile device-its security. T/F
False
Infrared light is next to the visible light on the light spectrum. T/F
True
The transmission time needed to repeat a signal from one earth station to another is approximately 250 milliseconds. T/F
True
Tethering may allow an unsecured mobile device to infect other tethered mobile devices or the corporate network. T/F
True
An embedded system is computer hardware and software contained within a smaller system that is designed for a specific function. T/F
False
Mobile devices with global positioning system (GPS) abilities typically make use of:
A) weak passwords
B) location services
C) open networks
D) anti-virus software
B) location services
Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices?
A) BYOD
B) COPE
C) VDI
D) CYOD
B) COPE
What type of technology can add geographical identification data to media such as digital photos taken on a mobile device?
A) GPS locating
B) GeoData tagging
C) GPS marking
D) GPS tagging
D) GPS tagging
Mobile devices using location services are at increased risk of targeted physical attacks. T/F
True
MAM comprises the tools to allow a device to be managed remotely by an organization. T/F
False
As a class, tablets are devices that closely resemble standard desktop computers. T/F
False
OTA stores sensitive applications and data on a remote server that is accessed through a smartphone. T/F
False
ANT is an enterprise mobile device deployment model. T/F
False
What type of management system below can help distribute and manage public and corporate apps?
A) Wireless Device Management
B) Mobile Device Management
C) Total Device Management
D) Extended Device Management
B) Mobile Device Management
Which of the following frameworks requires a QR code or PIN on each IoT device for authenticating it to the network, and uses an Elliptic Curve Diffie-Hellman secure key exchange and a Transport Layer Security (TLS) tunnel?
A) P2413 Standard
B) European Union Telecomm Law and Regulations
C) Security 2 (S2) framework
D) Industrial Internet Security Framework (IISF)
C) Security 2 (S2) framework
How is the coverage area for a cellular telephony network usually divided in a typical city?
A) Hexagon shaped cells.
B) Square square shaped cells.
C)Triangle shaped cells.
D) Circular shaped cells.
A) Hexagon shaped cells.
Which of the following selections is not one of the features provided by a typical MDM?
A) Rapidly deploy new mobile devices
B) Discover devices accessing enterprise systems
C) Track stolen devices
D) Enforce encryption settings
C) Track stolen devices
Select the option that represents a wearable technology.
A) Android
B) iPhone
C) Google Chromebook
D) Google Glass
D) Google Glass
Which enterprise deployment model allows users to use their personal mobile devices for business purposes?
A) BYOD
B) COPE
C) VDI
D) CYOD
A) BYOD
Which of the following systems is located in a satellite and regenerates a signal that is sent back to earth at another frequency?
A) repeater
B) cell transmitter
C) RF receiver
D) modulator
A) repeater
Which of the following is NOT an Android Smart Lock configuration option?
A) Trusted places detection
B) On-body detection
C) User device detection
D) Trusted face
C) User device detection