Chapter 10: Mobile Device Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of these can a QR code NOT contain? a. image b. URL c. email address d. phone number

a. image

What allows a device to be managed remotely? a. mobile device management (MDM) b. mobile application management (MAM) c. mobile resource management (MRM) d. mobile wrapper management (MWM)

a. mobile device management (MDM)

One of the first mobile devices was a ________. a. personal digital assistant (PDA) b. tablet c. smartphone d. notebook

a. personal digital assistant (PDA)

Which technology is NOT a characteristic of a mobile device? a. physical keyboard b. small form factor c.. local nonremovable storage d. data synchronization capabilities

a. physical keyboard

Bob has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. This means that Bob's mobile device is configured to ________. a. reset to factory settings b. extend the lockout period c. use PIN codes as passcodes d. double the amount of time he is prevented from accessing his device

a. reset to factory settings

Which of these is NOT a size of SD cards? a. smallSD b. miniSD c. microSD d. full SD

a. smallSD

Which mobile device is the smallest? a. subnotebook b. laptop c. notebook d. desktop

a. subnotebook

What does containerization do? a. it splits operating system functions only on specific brands of mobile devices b. it places all keys in a special vault c. it slows down a mobile device to half speed d. it separates personal data from corporate data

d. it separates personal data from corporate data

What prevents a mobile device from being used until the user enters the correct passcode? a. swipe identifier (SW-ID) b. keyboard c. touch pad d. lock screen

d. lock screen

What is one reason Android devices are considered to be at a higher security risk than iOS devices? a. iOS has been available longer and has more of its vulnerabilities worked out b. Android apps can be sideloaded c. all Android apps are free d. Apple apps are written in a more secure binary language

b. Android apps can be sideloaded

Which of these is NOT an advantage of BYOD for an organization? a. flexibility b. cost increases c. increased employee performance d. reduced internal service

b. cost increases

Tablet computers are designed for ________. a. processing capabilities b. ease of use c. wireless connection speed d. hardware upgrades

b. ease of use

What enforces the location in which an app can function by tracking the location of the mobile device? a. location resource management b. geo-fencing c. geo-tagging d. Graphical Management Tracking (GMT)

b. geo-fencing

Which of these is NOT a security feature for location a lost or stolen mobile device? a. remote lockout b. last known good configuration c. alarm d. thief picture

b. last known good configuration

Where does a web-based computer store user files? a. on its hard disk drive b. on the Internet c. on a microSD card d. on a Type II PC card

b. on the Internet

Which of these is NOT a type of SD card? a. Standard-Capacity b. High-Capacity c. Low-Capacity d. eXtended-Capacity

c. Low-Capacity

Which type of computer most closely resembles a desktop computer? a. notebook b. subnotebook c. laptop d. netbook

c. laptop

Mobile devices using ________ are at increased risk of targeted physical attacks. a. GPS b. captive portals c. location services d. Internet filters

c. location services

Each optional feature is found on most mobile devices EXCEPT ________. a. digital camera b. microphone c. operating system d. removable storage media

c. operating system

Which of these is NOT a risk of connecting a mobile device to a public network? a. public networks are beyond the control of the employee's organization b. public networks may be susceptible to man-in-the-middle attacks c. public networks are faster than local networks and can spread malware more quickly to mobile devices d. replay attacks can occur on public networks

c. public networks are faster than local networks and can spread malware more quickly to mobile devices


संबंधित स्टडी सेट्स

Passpoint: Safety and Infection Control

View Set

Ch62: Management of Patients with Cerebrovascular Disorders - ML3

View Set

Chapter 21: Immune System Mastering Anatomy

View Set

Ch. 12 Miscellaneous Commercial Policies

View Set

Cardiovascular NCLEX-PN 6th Edition

View Set