Chapter 10
What is the wireless protocol that is responsible for sending information wirelessly from one device to another device, in a robust and flexible manner?
ANT
What enterprise deployment model allows users to use their personal mobile devices for business purposes?
BYOD
Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices?
COPE
Which option allows a mobile device to be configured so that the device automatically unlocks and says unlocked until a specific action occurs? A. Selected context authentication B. Context-aware authentication C. User designated authentication D. Trigger locking
Context-aware authentication
An embedded system is computer hardware and software contained within a smaller system that is designed for a specific function. (True or False)
False
Virtual machines store sensitive applications and data on a remote server that is accessible through a smartphone. (True or False)
False
What type of technology can add geographical identification data to media such as digital photos taken on a mobile device?
GPS Tagging
What systems control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control devices such as valves, pumps, and motors without the need for human intervention?
ICS
Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise? A. Management Flexibility B. Increased Internal Service C. Increased Employee Performance D. Less Oversight
Increased Internal Service
Mobile devices with global positioning system (GPS) abilities typically use:
Location Services
How could an administrator initially manage applications on mobile devices using a technique called "app wrapping?"
Mobile Application
What type of management system below can help manage devices remotely? A. Wireless Device Management B. Mobile Device Management C. Total Device Management D. Extended Device Management
Mobile Device Management
What type of update service can Apple users take advantage of to update their operating systems via wireless carriers?
OTA
What type of software is specifically designed for a SoC in an embedded system?
RTOSterm-19
What helps companies avoid data privacy issues and legal concerns regarding a user's personal data?
Storage Segmentation
A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer?
Subnotebook
Which of the following selections is not one of the features provided by a typical MDM? A. Rapidly deploy new mobile devices B. Discover devices accessing enterprise systems C. Track stolen devices D. Enforce encryption settings
Track stolen devices
Some mobile devices can be configured so that the device automatically unlocks and stays unlocked until a specific action occurs. (True or False)
True
Tethering may allow an unsecured mobile device to infect other mobile devices or the corporate network.(True or False)
True
Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media player. A. Tablet B. Notebook C. Netbook D. Web-based
Web-based