cna 210 chapter 10

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Most mobile devices can be set to have the screen automatically lock after what range?

30 seconds to 30 minutes of inactivity.

Bob has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. This means that Bob's mobile device is configured to . a. reset to factory settings b. extend the lockout period c. use PIN codes as passcodes d. double the amount of time he is prevented from accessing his device

A. reset to factory settings

Which of these is NOT a size of SD cards? a. smallSD b. miniSD c. microSD d. full SD

A. smallSD

Which mobile device is the smallest? a. subnotebook b. laptop c. notebook d. desktop

A. subnotebook

geo-tagging

Adding or allowing geographical identification data in a mobile app.

Currently there are two dominant operating systems for mobile devices what are they?

Apple iOS and Google Android,

The most popular operating systems for tablets are what?

Apple iOS, Google Android, and Microsoft Windows

What is one reason Android devices are considered to be at a higher security risk than iOS devices? a. iOS has been available longer and has more of its vulnerabilities worked out. b. Android apps can be sideloaded. c. All Android apps are free. d. Apple apps are written in a more secure binary language.

B. Android apps can be sideloaded.

An enhanced type of PC Card is what?

Card bus

mobile device management (MDM)

Tools that allow a device to be managed remotely.

geo-fencing

Using a mobile device's GPS to define geographical boundaries where an app can be used.

What enforces the location in which an app can function by tracking the location of the mobile device? a. location resource management b. geo-fencing c. geo-tagging d. Graphical Management Tracking (GMT)

. B. geo-fencing

Which of these is NOT a type of SD card? a. Standard-Capacity b. High-Capacity c. Low-Capacity d. eXtended-Capacity

. C. Low-Capacity

What does containerization do? a. It splits operating system functions only on specific brands of mobile devices. b. It places all keys in a special vault. c. It slows down a mobile device to half speed. d. It separates personal data from corporate data.

. D. It separates personal data from corporate data.

The screen size on a netbook computer is how big?

5 to 12 inches

The two most common categories of tablet screen sizes are what?

5-8.5 inches 8.5-10 inches

smartphone

A mobile cell phone that has an operating system for running apps and accessing the Internet.

credential management

A secure repository for storing valuable authentication information on a mobile device.

Secure Digital (SD)

A small form factor storage media of a variety of different types and sizes.

lock screen

A technology that prevents a mobile device from being used until the user enters the correct passcode.

Which of these can a QR code NOT contain? a. image b. URL c. email address d. phone number

A. image

Which type of computer most closely resembles a desktop computer? a. notebook b. subnotebook c. laptop d. netbook

C. laptop

Mobile devices using are at increased risk of targeted physical attacks. a. GPS b. captive portals c. location services d. Internet filters

C. location services

Each optional feature is found on most mobile devices EXCEPT . a. digital camera b. microphone c. operating system d. removable storage media

C. operating system

The user BYOD benefits include what?

Choice of device Choice of carrier Convenience Attraction.

This requires the app to support geo-tagging, which is adding geographical identification data.

Geo-fencing

If an incorrect passcode is entered a set number of times, the user will be prompted to enter a special phrase to continue is known as what?

Reset to factory settings.

application control

See mobile application management (MAM)

location services

Services that can identify the location of a person carrying a mobile device or a specific store or restaurant.

What is the apple version of the subnotebook?

air

What is the greatest asset and vulnerability of mobile devices?

portability

These have similar hardware and run the same operating systems and application software that are found on a general-purpose desktop computer

portable computers

The primary difference between desktops and portable computers is what?

portable computers are smaller self-contained devices that can easily be transported from one location to another while operating on battery power

What allows a device to be managed remotely? a. mobile device management (MDM) b. mobile application management (MAM) c. mobile resource management (MRM) d. mobile wrapper management (MWM)

A. mobile device management (MDM)

One of the first mobile devices was a . a. personal digital assistant (PDA) b. tablet c. smartphone d. notebook

A. personal digital assistant (PDA)

Which technology is NOT a characteristic of a mobile device? a. physical keyboard b. small form factor c. local nonremovable data storage d. data synchronization capabilities

A. physical keyboard

Which of these is NOT an advantage of BYOD for an organization? a. flexibility b. cost increases c. increased employee performance d. reduced internal service

B. cost increases

Tablet computers are designed for . a. processing capabilities b. ease of use c. wireless connection speed d. hardware upgrades

B. ease of use

Which of these is NOT a security feature for locating a lost or stolen mobile device? a. remote lockout b. last known good configuration c. alarm d. thief picture

B. last known good configuration

Where does a web-based computer store user files? a. on its hard disk drive b. on the Internet c. on a microSD card d. on a Type II PC card

B. on the Internet

Which of these is NOT a risk of connecting a mobile device to a public network? a. Public networks are beyond the control of the employee's organization. b. Public networks may be susceptible to man-in-the-middle attacks. c. Public networks are faster than local networks and can spread malware more quickly to mobile devices. d. Replay attacks can occur on public networks.

C. Public networks are faster than local networks and can spread malware more quickly to mobile devices.

The most common locations for laptop theft are: _________________ . Hotels Airports Personal residences Public schools

D public schools

What prevents a mobile device from being used until the user enters the correct passcode? a. swipe identifier (SW-ID) b. keyboard c. touch pad d. lock screen

D. lock screen

If an incorrect passcode is entered a specific number of times, the lockout period will be extended. Is known as what?

Extend lockout period

True or False: BYOD relies on management securing a common wireless data carrier for all employees.

False

True or False: Security can be insured by obtaining apps only from the Apple Store or Google Play Store.

False

These cards are typically used in personal computers, video cameras, digital cameras, and other large consumer electronics devices.

Full SD

There are two encryption options what are they?

Full device encryption separating data storage into "containers" and encrypting only the sensitive data.

A management feature that sends an alert when a device is carried into a restricted physical area is known as __________________.

Geo-fencing

asset tracking

Maintaining an accurate record of company-owned mobile devices

There are several benefits of BYOD for companies what are some?

Management flexibility. Less oversight. Cost savings. Increased employee performance. Simplified IT infrastructure. Reduced internal service.

The technology that includes a server component that sends out commands and a client component on a phone/laptop/tablet that receives and applies the commands is called ___________________________.

Mobile device management

These allow a device to be managed remotely by an organization

Mobile device management (MDM)

tablet

Portable computing device that is generally larger than smartphones and smaller than notebooks, and is focused on ease of use.

These codes are a matrix or two-dimensional barcode first designed for the automotive industry in Japan.

Quick Response (QR) codes

There are some basic characteristics of mobile devices that differentiate them from other computing devices. These characteristics include what?

Small form factor Wireless data network interface for accessing the Internet, such as Wi-Fi or cellular data connection Mobile operating system Applications (apps) that can be acquired through different means, such as downloaded from the Web, included with the operating system, or provided by the wireless data carrier Data synchronization capabilities with a separate computer or remote servers Local nonremovable data storage

The SD format includes four card "families" available in three different form factors with different speed ratings what are the families?

Standard-Capacity (SDSC) High-Capacity (SDHC) eXtended-Capacity (SDXC) Secure Digital Input Output (SDIO)

What is the most secure way to lockdown a mobile device?

Strong passwords

These are designed for user convenience, tablets are thinner, lighter, easier to carry, and more intuitive to use than portable computers.

Tablets

These are portable computing devices that are generally larger than smartphones and smaller than notebooks, and are focused on ease of use

Tablets

Android

The Google operating system for mobile devices that is not proprietary

off-boarding

The ability to quickly remove devices from the organization's network.

on-boarding

The ability to rapidly enroll new mobile devices.

remote wiping

The ability to remotely erase sensitive data stored on a mobile device.

iOS

The operating system for Apple mobile devices that is a closed and proprietary architecture.

inventory control

The operation of stockrooms where mobile devices are stored prior to their dispersal.

mobile application management (MAM)

The tools and services responsible for distributing and controlling access to apps. Also called application control.

This sets up a "dynamic" library of software routines and adds to an existing program (binary) to restrict parts of an app.

app wrapping

This ensures that only preapproved apps can run on the device

application whitelisting

Several configurations should be considered when initially setting up a mobile device for use. What are they?

disabling unused features, enabling screen locks, using encryption, and controlling access to devices.

True or False: Smartphones are expected to capture 50 percent of the market share vs. feature phones by the year 2020.

false

This is a traditional cellular telephone that includes a limited number of features, such as a camera, an MP3 music player, and ability to send and receive short message service (SMS) text messages.

feature phone

Mobile devices use this for storage, which is a nonvolatile solid state electronic storage that can be electrically erased and reused

flash memory

Currently there are three sizes of SD cards what are they?

full SD, miniSD, and microSD

The earliest portable computer is what?

laptop

There are several security risks associated with using mobile devices what are some?

limited physical security, connecting to public networks location tracking installing unsecured applications accessing untrusted content bring your own device (BYOD) risks.

These cards are commonly used in smaller electronic devices like smartphones and tablets.

microSD and miniSD

This was a small, inexpensive, and lightweight portable computer

netbook computer

There are several different types of mobile devices what are some examples?

portable computers, tablets, smartphones, wearable technology, and legacy devices

This has all the tools that a feature phone has but also includes an operating system that allows it to run apps and access the Internet

smartphone

There are two types of SD speed classes what are they?

standard speed class the ultra high speed (UHS) speed class

Which is a more secure method of unlocking a screen: short PIN or swipe pattern?

swipe pattern

True or False: Disabling Bluetooth is a recommended security step?

true

True or False: Most portable devices have nonremovable data storage.

true

What is the Windows/intel version of the subnotebook?

ultrabook

Google Glass is an example of ________________ technology.

wearable

A new type of computing device that resembles a laptop computer is what?

web-based computer

This contains a limited version of the Linux operating systemand a web browserwith an integrated media player

web-based computer


Kaugnay na mga set ng pag-aaral

Ahip 2025 Module 3: Medicare Part D Prescription Drug Coverage

View Set

Washington Life and Health (Disability)

View Set

Digestive Hormones & Important Secretions

View Set