Security Module 10 Flashcards
Why would a user purchase a portable computer as opposed to a tablet?
Greater performance
How does Google Andriod software differ from that of Apple?
Google Andriod OS can be modified by anyone.
Where did QR codes originally come from and for which industry?
The automotive industry in Japan
Which of the following is NOT an accurate description of a laptop?
Hardware limits upgrading the OS
Why is it challenging for an attacker to compromise an Apple iOS application?
Closed and proprietary architecture
Which of the following uses SMS messaging between devices?
Feature phone
How does a web-based computer differ from a subnotebook computer?
Web-based computers are limited to web apps
How would an android phone prevent data from being compromised by a brute-force attack?
With reset to factory settings
What is considered the biggest vulnerability related to portable devices?
Protabililty
Which of the following is typically used by video and digital cameras?
Full SD
PDAs are legacy technology which was primarily replaced with which device?
Smartphone
Why would a user utilize container encryption on their smartphone instead of full device encryption?
Isolation of sensitive data
How does MAM initially manage apps by restricting parts of an app?
App wrapping
There are three types of PC cards that all share which common trait?
69-pin connector
Which of the folowing are important components of BYOD security?
MDMs and MAMs