BUIS 367 Chapter 5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

smartphone

A cellular phone that has an operating system that allows it to run apps and access the Internet.

Virtual Private Network (VPN)

A technology that uses an unsecured public network, such as the Internet, as if it were a secure private network, by encrypting data transmissions.

bluejacking

An attack that sends unsolicited messages to Bluetooth-enabled devices.

rooting

Removing the built-in limitations and protections on Google Android devices.

lock screen

Technology that prevents a mobile device from being used until the user enters the correct passcode, such as a PIN, password, swipe pattern on the screen, or a fingerprint touch ID.

Android

The Google operating system for mobile devices that is not proprietary but is entirely open for anyone to use or even modify.

remote wiping

The ability to remotely erase data stored on a mobile device.

iOS

The operating system developed by Apple for its mobile devices, using a closed and proprietary architecture.

__________ protects a mobile device when it has not been used for a set period of time.

auto-lock

__________ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

bluejacking

What prevents a mobile device from being used until the user enters the correct passcode?

lock screen

Which of the following is not a step to reduce the risk of theft or loss of a mobile device?

recording the MAC address of the device before using it

Which of the following is not a best practice for using a mobile device?

wait 24 hours before reporting a lost device

The technical name for a Wi-fi network is:

wireless local area network (WLAN)

wireless client network interface card adapter

A device that allows a mobile device to send and receive wireless signals.

wireless router

A device used for home-based Wi-fi network that combines several networking technologies.

access point (AP)

A more sophisticated device used in an office setting instead of a wireless router.

wearable technology

A new class of mobile technology consisting of devices that can be worn by the user instead of carried.

Wi-fi Protected Access 2 (WPA2) Personal

A security setting that provides the optimum level of wireless security.

Bluetooth

A short-range wireless technology designed for quickly interconnecting devices.

Wi-Fi Protected Setup (WPS)

A simplified and optional method for configuring WPA2 Personal wireless security, but has security weaknesses.

Wi-fi (wireless fidelity)

A wireless data network that is designed to provide high-speed data connections for mobile devices.

evil twin

An AP or another computer that is set up by an attacker designed to mimic the authorized Wi-Fi device.

bluesnarfing

An attack that accesses unauthorized information from a wireless device through a Bluetooth connection.

Which of the following is not a risk that someone would face using an unprotected home Wi-fi network?

An attacker could take control of the user's keyboard over the network

What is one reason Android devices are considered to be at a higher security risk than iOS devices?

Android apps can be sideloaded

sideloading

Downloading an app from an unofficial third-party website.

tablet

Portable computing device that is generally larger than smartphones and smaller than notebooks, and is focused on ease of use.

jailbreaking

Removing the built-in limitations and protections on Apple iOS devices.

war driving

Searching for wireless signals from an automobile or on foot using a portable computing device.

location services

Services that can identify the location of a person carrying a mobile device or a specific store or restaurant.

Institute of Electrical and Electronics Engineers (IEEE)

The most widely known and influential organization in the field of computer networking and wireless communications. The IEEE sets wireless networking standards.

Wireless Local Area Network (WLAN)

The technical name for a Wi-fi network.

What is the first step in securing a Wi-fi wireless broadband router?

creating a password to protect its internal configuration settings

Tablet computers are designed for ____________.

ease of use

The primary design of a(n) ____________ is to capture the transmissions from legitimate users.

evil twin

Which of the devices does not have an operating system that allows it to run third-party applications?

feature phone

Which of the following is false about a wireless router?

it is usually found in a large business with hundreds of wireless users

___________ is the process of bypassing the built-in limitations and protections of a mobile device.

jailbreaking

Alice has attempted to enter the passcode on her mobile device but keeps entering the wrong code. Now she is asked to enter a special phrase to continue. This means that her mobile device is configured to _____________.

reset to factory settings

When a user moves from one cell of coverage to another cell in a Wi-fi network this is called ___________.

roaming

Why should you not sideload apps from an unofficial app store?

the apps on these sites are generally not previewed and my contain malware

Which of the following can add a stronger degree of security to a Wi-fi network?

turn on guest access

What provides the optimum level of wireless security for a home Wi-fi network?

turning on Wi-fi Protected Access 2 (WPA2) Personal

Each of the following is a sound security practice when using a public Wi-fi network except___________.

using the network for less than one hour per day


संबंधित स्टडी सेट्स

Practice Computer Fundamentals 2

View Set

Investigating Oceanography - Ch. 2 & 3

View Set