Security Module 10 Flashcards

1
Q

Why would a user purchase a portable computer as opposed to a tablet?

A

Greater performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does Google Andriod software differ from that of Apple?

A

Google Andriod OS can be modified by anyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where did QR codes originally come from and for which industry?

A

The automotive industry in Japan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT an accurate description of a laptop?

A

Hardware limits upgrading the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it challenging for an attacker to compromise an Apple iOS application?

A

Closed and proprietary architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following uses SMS messaging between devices?

A

Feature phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a web-based computer differ from a subnotebook computer?

A

Web-based computers are limited to web apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How would an android phone prevent data from being compromised by a brute-force attack?

A

With reset to factory settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is considered the biggest vulnerability related to portable devices?

A

Protabililty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is typically used by video and digital cameras?

A

Full SD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PDAs are legacy technology which was primarily replaced with which device?

A

Smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why would a user utilize container encryption on their smartphone instead of full device encryption?

A

Isolation of sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does MAM initially manage apps by restricting parts of an app?

A

App wrapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

There are three types of PC cards that all share which common trait?

A

69-pin connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the folowing are important components of BYOD security?

A

MDMs and MAMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is NOT a security feature provided by mobile devices?

A

GPS tracking of dead devices

17
Q

How does a bus mastering feature allow a CardBus to be more efficient when accessing data?

A

Communicating with devices without the CPU

18
Q

Which of the following is a threat vector associated with mobile devices?

A

Unused features

19
Q

How would an app be restricted by MDMs based on geographical criteria?

A

Geo-fancing

20
Q

Which of the following is NOT part of the Secure Digital card family?

A

Ultra-Capacity