Chapter 10
Which technology is NOT a characteristic of a mobile device? A) 100% secure communication B) small form factor C) local nonremovable data storage D) data synchronization capabilities
100% secure communication
A QR code can't contain which of the following items directly? A) A URL B) A phone number C) An e-mail address D) A video
A video
What is one reason Android devices are considered to be at a higher security risk than iOS devices? A) iOS has been available longer and has more of its vulnerabilities worked out. B) Android apps can be sideloaded. C) All Android apps are free. D) Apple apps are written in a more secure binary language.
Android apps can be sideloaded.
Where did QR codes originally come from and for which industry? A) Shipping industry in China B) Automotive industry in Japan C) Aviation industry across the world D) Consumer products in the US
Automotive industry in Japan
Select below the option that is not one of the SD format card families: A) Standard capacity (SDSC) B) High capacity (SDHC) C) Extreme Capacity (SDXC) D) Secure Digital Input Output (SDIO)
Extreme Capacity (SDXC)
How would an app be restricted by MDMs based on geographical criteria? A) Location services B) Geo-tagging C) Remote lock D) Geo-fencing
Geo-fencing
Which of the following is NOT an accurate description of a laptop? A) Replicates functionality of a desktop B) Hardware limits upgrading the OS C) Integrated optical drive D) Includes fans
Hardware limits upgrading the OS
What does containerization do? A) It splits operating system functions only on specific brands of mobile devices. B) It places all keys in a special vault. C) It slows down a mobile device to half speed. D) It separates personal data from corporate data.
It separates personal data from corporate data.
Which of these is NOT a type of SD card? A) Standard-Capacity B) High-Capacity C) Low-Capacity D) eXtended-Capacity
Low-Capacity
What type of management system below can help facilitate asset tracking? A) Wireless Device Management (WDM) B) Mobile Device Management (MDM) C) Extended Device Management (EDM) D) Total Device Management (TDM)
Mobile Device Management (MDM)
Which of these is NOT a risk of connecting a mobile device to a public network? A) Public networks are beyond the control of the employee's organization. B) Public networks may be susceptible to man-in-the-middle attacks. C) Public networks are faster than local networks and can spread malware more quickly to mobile devices. D) Replay attacks can occur on public networks.
Public networks are faster than local networks and can spread malware more quickly to mobile devices.
Select below the item that is not considered to be a basic characteristic of mobile devices: A) Small form factor B) Mobile operating system C) Removable media storage D) Data synchronization capabilities
Removable media storage
Select below the type of computing device that uses a limited version of the Linux operating system and uses a web browser with an integrated media player: A) Tablet B) Notebook C) Netbook D) Web-based
Web-based
How does a web-based computer differ from a subnotebook computer? A) Web-based computers are limited to web apps B) Subnotebook computers cannot utilize browsers C) Web-based computers are smaller than subnotebooks D) Subnotebook computers only run Windows
Web-based computers are limited to web apps
How would an android phone prevent data from being compromised by a brute-force attack? A) With reset to factory settings B) Encrypted passwords C) Extended lockout period D) Pin number
With reset to factory settings
Which of these is NOT an advantage of BYOD for an organization? A) flexibility B) cost increases C) increased employee performance D) reduced internal service
cost increases
Tablet computers are designed for _____. A) processing capabilities B) ease of use C) wireless connection speed D) hardware upgrades
ease of use
What enforces the location in which an app can function by tracking the location of the mobile device? A) location resource management B) geo-fencing C) geo-tagging D) Graphical Management Tracking (GMT)
geo-fencing
Which of these can a QR code NOT contain? A) image B) URL C) email address D) phone number
image
Which type of computer most closely resembles a desktop computer? A) notebook B) subnotebook C) laptop D) netbook
laptop
Which of these is NOT a security feature for locating a lost or stolen mobile device? A) remote lockout B) last known good configuration C) alarm D) thief picture
last known good configuration
Mobile devices using _____ are at increased risk of targeted physical attacks. A) GPS B) captive portals C) location services D) Internet filters
location services
What prevents a mobile device from being used until the user enters the correct passcode? A) swipe identifier (SW-ID) B) keyboard C) touch pad D) lock screen
lock screen
What allows a device to be managed remotely? A) mobile device management (MDM) B) mobile application management (MAM) C) mobile resource management (MRM) D) mobile wrapper management (MWM)
mobile device management (MDM)
Where does a web-based computer store user files? A) on its hard disk drive B) on the Internet C) on a microSD card D) on a Type II PC card
on the Internet
Each optional feature is found on most mobile devices EXCEPT _____. (Which one is required in all mobile devices?) A) digital camera B) microphone C) operating system D) removable storage media
operating system
One of the first mobile devices was a _____. A) personal digital assistant (PDA) B) tablet C) smartphone D) notebook
personal digital assistant (PDA)
Bob has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. This means that Bob's mobile device is configured to _____. A) reset to factory settings B) extend the lockout period C) use PIN codes as passcodes D) double the amount of time he is prevented from accessing his device
reset to factory settings
Which of these is NOT a size of SD cards? A) smallSD B) miniSD C) microSD D) full SD
smallSD
Which mobile device is the smallest? A) subnotebook B) laptop C) notebook D) desktop
subnotebook