Module 05 Mobile, Embedded, and Specialized Device Security
Agape has been asked to experiment with different hardware to create a controller for a new device on the factory floor. She needs a credit-card-sized motherboard that has a microcontroller instead of a microprocessor. Which would be the best solution? a. Arduino b. SoC c. FPGA d. Raspberry Pi
a. Arduino
Akira is explaining to his team members the security constraints that have made it a challenge for protecting a new embedded system. Which of the following would Akira NOT include as a constraint? a. Availability b. Authentication c. Power d. Cost
a. Availability
Which tool manages the distribution and control of apps? a. MAM b. MFM c. MDM d. MCM
a. MAM
Which of these is used to send SMS text messages to selected users or groups of users? a. Push notification services b. Replay notification distribution (RND) c. Pull notification services d. MAM mass SMS
a. Push notification services
What enforces the location in which an app can function by tracking the location of the mobile device? a. Graphical Management Tracking (GMT) b. GPS tagging c. Location resource management d. Geofencing
d. Geofencing
Which of the following technologies can convert a texting app into a live chat platform? a. QR b. SMS c. MMS d. RCS
d. RCS
Which type of OS is typically found on an embedded system? a. SoC b. COPE c. OTG d. RTOS
d. RTOS
What prevents a mobile device from being used until the user enters the correct passcode? a. Touch swipe b. Swipe identifier (SW-ID) c. Screen timeout d. Screen lock
d. Screen lock
Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates? a. Because many of the OEMs have modified Android, they are reluctant to distribute updates that could potentially conflict with their changes. b. Because OEMs want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely. c. OEMs are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates. d. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks.
d. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks.
Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki's advice regarding its. Which of the following would Enki NOT tell him? a. USB OTG is only available for connecting Android devices to a subnotebook. b. A device connected via USB OTG can function as a host. c. Connecting a mobile device to an infected computer using USB OTG could allow malware to be sent to that device. d. A device connected via USB OTG can function as a peripheral for external media access.
a. USB OTG is only available for connecting Android devices to a subnotebook.
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support? a. COPE b. CYOD c. Corporate owned d. BYOD
b. CYOD
What is the process of identifying the geographical location of a mobile device? a. Geotracking b. Geolocation c. GeoID d. Geomonitoring
b. Geolocation
Which of these is considered the strongest type of passcode to use on a mobile device? a. Draw connecting dots pattern b. Password c. Fingerprint swipe d. PIN
b. Password
Banko's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called? a. Jailbreaking b. Rooting c. Ducking d. Sideloading
b. Rooting
Hakaku needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution? a. MCCM b. UEM c. MMAM d. MDM
b. UEM
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document? a. Encryption occurs when the mobile device is locked. b. Data backed up to an Apple or Google server could be unlocked by a court order. c. Apple uses file-based encryption to offer a higher level of security. d. All modern versions of mobile device OS encrypt all user data by default.
c. Apple uses file-based encryption to offer a higher level of security.
What does containerization do? a. It splits operating system functions only on specific brands of mobile devices. b. It places all keys in a special vault. c. It separates personal data from corporate data. d. It slows down a mobile device to half speed.
c. It separates personal data from corporate data.
Which of these is NOT a security feature for locating a lost or stolen mobile device? a. Alarm b. Thief picture c. Last known good configuration d. Remote lockout
c. Last known good configuration
What allows a device to be managed remotely? a. Mobile application management (MAM) b. Mobile resource management (MRM) c. Mobile device management (MDM) d. Mobile wrapper management (MWM)
c. Mobile device management (MDM)
Which of the following is NOT a context-aware authentication? a. Trusted places b. Trusted contacts c. On-body detection d. Trusted devices
c. On-body detection