Intro to Network Security sixth ed chapter 10

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

cellular telephony

A communications network in which the coverage area is divided into hexagon-shaped cells.

GPS tagging

Adding geographical identification data to media such as digital photos taken on a mobile device.

C. Infrared

Agape was asked to make a recommendation regarding short-range wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she NOT consider due to its slow speed and its low deployment levels today? A. ANT B. Bluetooth C. Infrared D. NFC

bring your own device (BYOD)

Allows users to use their own personal mobile devices for business purposes.

real-time operating system (RTOS)

An operating system that is specifically designed for a system on a chip (SoC) in an embedded system.

A. Type D

Calista is designing the specifications for new laptop computers to be purchased by her company. She is comparing the different types and sizes of USB connections found on the devices. Which type USB connection would she NOT find on a laptop? A. Type D B. Mini C. Micro D. Standard

rooting

Circumventing the installed built-in limitations on Android devices.

jailbreaking

Circumventing the installed built-in limitations on Apple iOS devices.

embedded system

Computer hardware and software contained within a larger system that is designed for a specific function.

Internet of Things (IoT)

Connecting any device to the Internet for the purpose of sending and receiving data to be acted upon.

sideloading

Downloading unofficial apps.

corporate owned, personally enabled (COPE)

Employees choose from a selection of company approved devices.

heating, ventilation, and air conditioning (HVAC)

Environmental systems that provide and regulate heating and cooling.

custom firmware

Firmware that is written by users to own and run on their own mobile devices.

A. reset to factory settings

Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. Which configuration setting is enabled on Gaetan's mobile device? A. reset to factory settings B. extend lockout period C. enable high security D. lock device

C. CYOD

In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support? A. BYOD B. COPE C. CYOD D. Corporate-owned

D. push notification services

Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regarding a serious malware incident. What technology will she use? A. MCM B. COPE C. MAM D. push notification services

infrared

Light that is next to visible light on the light spectrum and was once used for data communications.

firmware OTA updates

Mobile operating system patches and updates that are distributed by the wireless carrier as an over-the-air (OTA) update.

D. Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo's opinion regarding its security. What would Paavo tell him about USB OTG security? A. USB OTG uses strong security and the executive should have no concerns. B. Subnotebooks do not support USB OTG. C. An unsecured mobile device could infect other tethered mobile devices or the corporate network. D. Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

push notification services

Sending SMS text messages to selected users or groups of users.

storage segmentation

Separating business data from personal data on a mobile device.

containerization

Separating storage into separate business and personal "containers."

industrial control systems (ICS)

Systems that collect, monitor, and process real-time data to control machines locally or at remote sites.

multimedia messaging service (MMS)

Text messages in which pictures, video, or audio can be included.

short message service (SMS)

Text messages of a maximum of 160 characters.

geolocation

The process of identifying the geographical location of a device.

application management

The tools and services responsible for distributing and controlling access to apps.

content management

Tools used to support the creation and subsequent editing and modification of digital content by multiple employees.

carrier unlocking

Uncoupling a phone from a specific wireless provider.

USB connections

Universal Serial Bus (USB) connector on mobile devices that is used for data transfer.

context-aware authentication

Using a contextual setting to validate a user.

tethering

Using a mobile device with an active Internet connection to share that connection with other mobile devices through Bluetooth or Wi-Fi.

geofencing

Using the mobile device's GPS to define geographical boundaries where an app can be used.

A. mobile device management (MDM)

What allows a device to be managed remotely? A. mobile device management (MDM) B. mobile application management (MAM) C. mobile resource management (MRM) D. mobile wrapper management (MWM)

D. It separates personal data from corporate data.

What does containerization do? A. It splits operating system functions only on specific brands of mobile devices. B. It places all keys in a special vault. C. It slows down a mobile device to half speed. D. It separates personal data from corporate data.

A. password

Which of these is considered the strongest type of passcode to use on a mobile device? A. password B. PIN C. fingerprint swipe D. draw connecting dots pattern

A. physical keyboard

Which technology is NOT a core feature of a mobile device? A. physical keyboard B. small form factor C. local non-removable data storage D. data synchronization capabilities

A. MAM

Which tool manages the distribution and control of apps? A. MAM B. MDM C. MCM D. MFM

B. RTOS

Which type of OS is typically found on an embedded system? A. SoC B. RTOS C. OTG D. COPE

B. geofencing

What enforces the location in which an app can function by tracking the location of the mobile device? A. location resource management B. geofencing C. GPS tagging D. Graphical Management Tracking (GMT)

B. geolocation

What is the process of identifying the geographical location of a mobile device? A. geotracking B. geolocation C. geoID D. geomonitoring

corporate-owned

A mobile device that is purchased and owned by the enterprise.

C. Jailbreaking

A friend of Ukrit told him that he has just downloaded and installed an app that allows him to circumvent the built-in limitations on his Apple iOS smartphone. What is this called? A. Rooting B. Sideloading C. Jailbreaking D. Ducking

personal identification number (PIN)

A pass-code made up of numbers only.

ANT

A proprietary wireless network technology that is used primarily by sensors for communicating data.

satellite communications (SATCOM)

A satellite that uses a repeater to send and receive signals from earth.

screen lock

A security setting that prevents a mobile device from being accessed until the user enters the correct passcode permitting access.

system on a chip (SoC)

A single microprocessor chip on which all the necessary hardware compo-nents are contained.

third-party app store

A site from which unofficial apps can be downloaded.

USB On-the-Go (OTG)

A specification that allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access.

supervisory control and data acquisition (SCADA)

A system that controls multiple industrial control systems (ICS).

remote wipe

A technology used to erase sensitive data stored on the mobile device.

choose your own device (CYOD)

Employees choose from a limited selection of approved devices but the employee pays the upfront cost of the device while the business owns the contract.

C. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks.

Pakpao has been asked to provide research regarding a new company initiative to add Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Pakpao NOT list in his report as a factor in the frequency of Android firmware OTA updates? A. Both OEMs and wireless carriers are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates. B. Because many of the OEMs had modified Android, they are reluctant to distribute updates that could potentially conflict with their changes. C. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks. D. Because OEMs and wireless carriers want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely.

B. screen lock

What prevents a mobile device from being used until the user enters the correct passcode? A. swipe identifier (SW-ID) B. screen lock C. screen timeout D. touch swipe

A. MMS

Which of the following technologies provides for pictures, video, or audio to be included in text messages? A. MMS B. QR C. SMS D. ANT

D. Public networks are faster than local networks and can spread malware more quickly to mobile devices.

Which of these is NOT a risk of connecting a mobile device to a public network? A. Public networks are beyond the control of the employee's organization. B. Replay attacks can occur on public networks. C. Public networks may be susceptible to man-in-the-middle attacks. D. Public networks are faster than local networks and can spread malware more quickly to mobile devices.

B. last known good configuration

Which of these is NOT a security feature for locating a lost or stolen mobile device? A. remote lockout B. last known good configuration C. alarm D. thief picture


Kaugnay na mga set ng pag-aaral

Topic 7B: Compare Wireless Security Protocols

View Set

1535 Nutrition, Health Promotion, Teaching

View Set