Quiz 10 Flashcards

1
Q

Mobile devices with global positioning system (GPS) abilities typically make use of: T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virtual machines store sensitive applications and data on a remote server that is accessed through a smartphone. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Some mobile devices can be configured so that the device automatically unlocks and stays unlocked until a specific action occurs. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The greatest asset of a mobile device-its security. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Infrared light is next to the visible light on the light spectrum. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The transmission time needed to repeat a signal from one earth station to another is approximately 250 milliseconds. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tethering may allow an unsecured mobile device to infect other tethered mobile devices or the corporate network. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An embedded system is computer hardware and software contained within a smaller system that is designed for a specific function. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mobile devices with global positioning system (GPS) abilities typically make use of:

A) weak passwords
B) location services
C) open networks
D) anti-virus software

A

B) location services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices?

A) BYOD
B) COPE
C) VDI
D) CYOD

A

B) COPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of technology can add geographical identification data to media such as digital photos taken on a mobile device?

A) GPS locating
B) GeoData tagging
C) GPS marking
D) GPS tagging

A

D) GPS tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile devices using location services are at increased risk of targeted physical attacks. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAM comprises the tools to allow a device to be managed remotely by an organization. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

As a class, tablets are devices that closely resemble standard desktop computers. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OTA stores sensitive applications and data on a remote server that is accessed through a smartphone. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ANT is an enterprise mobile device deployment model. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of management system below can help distribute and manage public and corporate apps?

A) Wireless Device Management
B) Mobile Device Management
C) Total Device Management
D) Extended Device Management

A

B) Mobile Device Management

18
Q

Which of the following frameworks requires a QR code or PIN on each IoT device for authenticating it to the network, and uses an Elliptic Curve Diffie-Hellman secure key exchange and a Transport Layer Security (TLS) tunnel?

A) P2413 Standard

B) European Union Telecomm Law and Regulations

C) Security 2 (S2) framework

D) Industrial Internet Security Framework (IISF)

A

C) Security 2 (S2) framework

19
Q

How is the coverage area for a cellular telephony network usually divided in a typical city?

A) Hexagon shaped cells.

B) Square square shaped cells.

C)Triangle shaped cells.

D) Circular shaped cells.

A

A) Hexagon shaped cells.

20
Q

Which of the following selections is not one of the features provided by a typical MDM?

A) Rapidly deploy new mobile devices

B) Discover devices accessing enterprise systems

C) Track stolen devices

D) Enforce encryption settings

A

C) Track stolen devices

21
Q

Select the option that represents a wearable technology.

A) Android

B) iPhone

C) Google Chromebook

D) Google Glass

A

D) Google Glass

22
Q

Which enterprise deployment model allows users to use their personal mobile devices for business purposes?

A) BYOD

B) COPE

C) VDI

D) CYOD

A

A) BYOD

23
Q

Which of the following systems is located in a satellite and regenerates a signal that is sent back to earth at another frequency?

A) repeater

B) cell transmitter

C) RF receiver

D) modulator

A

A) repeater

24
Q

Which of the following is NOT an Android Smart Lock configuration option?

A) Trusted places detection

B) On-body detection

C) User device detection

D) Trusted face

A

C) User device detection

25
Q

A QR code can’t contain which of the following items directly?

A) A URL.

B) A phone number.

C) An e-mail address.

D) A video.

A

D) A video.

26
Q

MDM tools cannot provide the ability to detect and restrict jailbroken and rooted devices. T/F

A

False

27
Q

Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media player.

A) tablet

B) notebook

C) netbook

D) web-based

A

D) web-based

28
Q

Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise?

A) management flexibility

B) increased internal service

C) increased employee performance

D) less oversight

A

B) increased internal service

29
Q

What type of software is specifically designed for a SoC in an embedded system?

A) SCADA

B) HVAC

C) ICS

D) RTOS

A

D) RTOS

30
Q

What PIN is considered to be the most commonly used PIN?

A

1234

31
Q

Which of the following can replace using radio frequency (RF) for the communication media?

A

infrared

32
Q

Select the proprietary wireless network technology that is used primarily by sensors for communicating data.

A

ANT

33
Q

How could an administrator initially manage applications on mobile devices using a technique called “app wrapping?”

A

Mobile Application Management

34
Q

What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access?

A

OTG

35
Q

What process gives a user access to a file system on a mobile device with full permissions, essentially allowing the user to do anything on the device?

A

jailbreaking

36
Q

Which option allows a mobile device to be configured so that the device automatically unlocks and stays unlocked until a specific action occurs?

A

context-aware authentication

37
Q

What systems control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control devices such as valves, pumps, and motors without the need for human intervention?

A

ICS

38
Q

What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?

A

Enable a lock screen

39
Q

What portable computing devices, designed for user convenience, have a sensor called an accelerometer that senses vibrations and movements that can determine the orientation of the device?

A

tablets

40
Q

Which management system is used to support the creation and subsequent editing and modification of digital content by multiple employees?

A

content management

41
Q

Select the item that is not considered to be a basic characteristic of mobile devices.

A

A removable media storage

42
Q

A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer?

A

subnotebook