Chapter 10
mobile application management
How could an administrator initially manage applications on mobile devices using a technique called "app wrapping?"
True
Infrared light is next to the visible light on the light spectrum.
False
MDM tools cannot provide the ability to detect and restrict jailbroken and rooted devices.
a removable media storage
Select the item that is not considered to be a basic characteristic of mobile devices.
True
Some mobile devices can be configured so that the device automatically unlocks and stays unlocked until after a specific action occurs
False
Virtual machines store sensitive applications and data on a remote server that is accessed through a smartphone
increased internal service
Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise?
User device detection
Which of the following is NOT an Android Smart Lock configuration option?
track stolen devices
Which of the following selections is not one of the features provided by a typical MDM?
context-aware authentication
Which option allows a mobile device to be configured so that the device automatically unlocks and stays unlocked until a specific action occurs?
Employees are more likely to be productive while traveling or working away from the office if they are comfortable with their device.
How does BYOD increase employee performance?
hexagon shaped cells
How is the coverage area for a cellular telephony network usually divided in a typical city?
COPE
Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices?
Content managemetn
Which management system is used to support the creation and subsequent editing and modification of digital content by multiple employees?
True
Mobile devices using location services are at increased risk of targeted physical attacks
location services
Mobile devices with global positioning system (GPS) abilities typically make use of:
web-based
Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media player.
Google Glass
Select the option that represents a wearable technology.
ANT
Select the proprietary wireless network technology that is used primarily by sensors for communicating data
ANSWER: Securing mobile devices requires configuring the device, using mobile management tools, and configuring device app security.
What basic steps are included in securing mobile devices?
Enable a lock screen
What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?
OTG
What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access?
1234
What PIN is considered to be the most commonly used PIN?
BYOD
Which enterprise deployment model allows users to use their personal mobile devices for business purposes?
infrared
Which of the following can replace using radio frequency (RF) for the communication media?
Security 2 (S2) framework
Which of the following frameworks requires a QR code or PIN on each IoT device for authenticating it to the network, and uses an Elliptic Curve Diffie-Hellman secure key exchange and a Transport Layer Security (TLS) tunnel?
a video
A QR code can't contain which of the following items directly?
subnotebook
A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer?
False
An embedded system is computer hardware and software contained within a smaller system that is designed for a specific function.
False
As a class, tablets are devices that closely resemble standard desktop computers.
ANSWER: Content management is used to support the creation and subsequent editing and modification of digital content by multiple employees. It can include tracking editing history, version control (recording changes and "rolling back" to a previous version if necessary), indexing, and searching.
Describe how content management is used.
ANSWER: 1. Keep the mobile device out of sight when traveling in a high-risk area. 2. Avoid becoming distracted by what is on the device. Always maintain an awareness of your surroundings. 3. When holding a device, use both hands to make it more difficult for a thief to snatch. 4. Do not use the device on escalators or near transit train doors. 5. White or red headphone cords may indicate they are connected to an expensive device. Consider changing the cord to a less conspicuous color. 6. If a theft does occur, do not resist or chase the thief. Instead, take note of the suspect's description, including any identifying characteristics and clothing, and then call the authorities. Also contact the organization or wireless carrier and change all passwords for accounts accessed on the device.
List at least three things that can be done in order to reduce the risk of theft or loss of a mobile device
True
Tethering may allow an unsecured mobile device to infect other tethered mobile devices or the corporate network
False
The greatest asset of a mobile device-its security.
True
The transmission time needed to repeat a signal from one earth station to another is approximately 250 milliseconds
An attacker could create an advertisement for a reputable website, such as a bank, and then include a QR code that contains a malicious URL that redirects an unsuspecting user to an impostor website.
How might an attacker misuse a QR code?
A notebook computer is a smaller version of a laptop computer and is considered a lightweight personal computer. Notebook computers typically weigh less than laptops and are small enough to fit easily inside a briefcase.
Describe a notebook computer in relation to a laptop computer.
1.Users may erase the installed built-in limitations on their smartphone (called jailbreaking on Apple iOS devices or rooting on Android devices) to provide additional functionality. However, this also disables the built-in operating system security features on the phone. 2.Personal mobile devices are often shared among family members and friends, subjecting sensitive corporate data installed on a user's device to outsiders. 3.Different mobile devices have different hardware and different versions of operating systems, all of which contain different levels and types of security features. Technical support staff may be called upon to support hundreds of different mobile devices, creating a nightmare for establishing a security baseline. 4.Mobile devices may be connected to a user's personal desktop computer that is infected, thus infecting the mobile device and increasing the risk of the organization's network becoming infected when the mobile device connects to it. 5.There may be difficulties in securing the personal smartphone from an employee who was fired so that any corporate data on it can be erased.
Describe some of the risks associated with using mobile devices in an enterprise environment.
Simply put, the IoT is connecting any device to the Internet for the purpose of sending and receiving data to be acted upon. Although this definition could encompass laptop computers and tablets, more often IoT refers to devices that heretofore were not considered as computing devices connected to a data network. IoT devices include wearable technology and multifunctional devices as well as many everyday home automation items such as thermostats, coffee makers, tire sensors, slow cookers, keyless entry systems, washing machines, electric toothbrushes, headphones, and light bulbs, to name just a few.
What is the Internet of Things (IoT)?
ANSWER: A feature phone is a traditional cell phone, whereas a smartphone has all the tools that a feature phone has, but also includes a mobile operating system that allows for the use of applications and Internet access.
What is the difference between a feature phone and a smartphone?
iOS
What mobile operating system below requires all applications to be reviewed and approved before they can be made available in the App store?
ANSWER: Storage segmentation, which separates business data from personal data.
What particular option can be used mobile devices that contain both personal and corporate data?
tablets
What portable computing devices, designed for user convenience, have a sensor called an accelerometer that senses vibrations and movements that can determine the orientation of the device?
jailbreaking
What process gives a user access to a file system on a mobile device with full permissions, essentially allowing the user to do anything on the device?
ICS
What systems control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control devices such as valves, pumps, and motors without the need for human intervention?
Mobile device management
What type of management system below can help distribute and manage public and corporate apps?
RTOS
What type of software is specifically designed for a SoC in an embedded system?
GPS tagging
What type of technology can add geographical identification data to media such as digital photos taken on a mobile device?
OTA
What type of update service can Apple users take advantage of to update their operating systems via wireless carriers?
repeater
Which of the following systems is located in a satellite and regenerates a signal that is sent back to earth at another frequency?