CompTIA Module 5 Review

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What does COPE stand for? A) Corporate Oriented Product Enhancement B) Corporate Operations and Performance Enhancement C) Corporate-Owned, Personally-Enabled D) Cooperative Open-source Platform Environment

Corporate-Owned, Personally-Enabled

What does SoC stand for? A) Security Operations Center B) System on a Chip C) State of Connection D) Service-oriented Computing

System on a Chip

What does containerization do? a) It splits operating system functions only on specific brands of mobile devices b) it places all kets in a special vault c) it slows down a mobile device to half speed d) it separates personal data from corporate data

it separates personal data from corporate data

Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document? a) All modern versions of mobile devices OS encrypt all user data by default b) Encryption occurs when the mobile device is locked c) Apple uses file-based encryption to offer a higher level of security d) Incorrect. This statement is accurate

Apple uses file-based encryption to offer a higher level of security

Agape has been asked to experiment with different hardware to create a controller for a new device on the factory floor. She needs a credit-card-sized motherboard that has a microcontroller INSTEAD of a microprocessor. Which would be the best solution? a) Arduino b) Rasberry Pi c) SoC d) FPGA

Arduino

Which of the following types of attacks are possible on the building automation systems - the building's heating, ventilation and air conditioning (HVAC) systems? [Choose all that apply] A) Authentication bypass B) Hardcoded secrets C) Path traversal D) Cross-site scripting E) Buffer overflow

Authentication bypass, Hardcoded secrets, Path traversal, Cross-site scripting, Buffer overflow

Akira is explaining to his team members the security constraints that have made it a challenge for protecting a new embedded system. Which of the following would Akira NOT include as a constraint? a) Authentication b) Cost c) Power d) Availability

Availability

In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support? a) CYOD b) COPE c) BYOD d) Corporate Owned

CYOD

This is a hardware "chip" that can be programmed by a user to carry out one or more logical operations a) SoC b) SCADA c) FPGA d) MDM

FPGA

What does FPGA stand for? a) File and Printer Gateway Adapter b) Fully Protected Gateway Association c) Fast Performance Global Access d) Field-Programmable Gate Array

Field-Programmable Gate Array

What is the process of identifying the geographical location of a mobile device? a) Geotracking b) Geolocation c) GeoID d) Geomonitoring

Geolocation

Which type of sensors can be included in an Internet of Things (IoT) device? [Choose all that apply] A) Humidity B) Acceleration C) Temperature D) Accelerometer E) Gyro

Humidity, Acceleration, Temperature, Accelerometer, Gyro

A security analyst is securing smartphones and laptops for a highly mobile workforce. Priorities include: -Remote wipe capabilities -Geolocation services -Patch management and reporting -Mandatory screen locks -Ability to require passcodes and pins -Ability to require encryption Which of the following would best meet these requirements? a) Implementing MDM software b) Deploying relevant group policies to the devices c) installing full device encryption d) Removing administrative rights to the devices

Implementing MDM software

What does ICS stand for? A) Industrial Classification System B) Industrial Control Systems C) Industrial Communication Services D) Indistinctive Content Sharing

Industrial Control Systems

Banko's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Apple smartphone. What is this called? a) Rooting b) Sideloading c) Jailbreaking d) Ducking

Jailbreaking

Significant loopholes exist in mobile device data-in-transit and data-at-rest. Which of the following is not one of the loop-holes a) Apple and Google possess decryption keys necessary to unlock data on their servers b) Carriers build surveillance capabilities into their networks which allows law enforcement agencies to collect data-in-transit c) Courts can server orders to Apple and Google to provide data stored on their servers d) Leakage of PCI DSS encrypted data

Leakage of PCI DSS encrypted data

UEM is a combo of what other 3 mobile management tools? a) MCM b) MAM c) MMS d) RCS e) MDM

MCM, MDM, MAM

A form of messaging that allows you to send audio messages, photos, and videos. Select the best answer a) SMS b) RCS c) Instant Messaging d) MMS

MMS

What does MAM stand for? A) Metadata Access Management B) Master Access Manager C) Multi-factor Authentication Module D) Mobile Application Management

Mobile Application Management

What does MCM stand for? A) Mobile Control Mechanism B) Mobile Credential Manager C) Multi-layered Communication Module D) Mobile Content Management

Mobile Content Management

What allows a device to be managed remotely? a) Mobile Device Management (MDM) b) Mobile Application Management (MAM) c) Mobile Resource Management (MRM) d) Mobile Wrapper Management (MWM)

Mobile Device Management (MDM)

What does MMS stand for? A) Multimedia Messaging Service B) Mobile Messaging System C) Managed Monitoring Solution D) Message Manipulation System

Multimedia Messaging Service

What does OTA stand for A) Online Technical Assistance B) Over-The-Air C) Open Threat Analysis D) Operational Technology Assessment

Over-The-Air

Security risks associated with using mobile devices include all of the following except: a) Device vulnerabilities b) Connection vulnerabilities c) Patch verification d) Accessing untrusted content

Patch verification

Which of the following are examples of embedded systems? [Choose all that apply] A) Printers B) Digital Cameras C) Automobiles D) Digital Watches E) Automatic Teller Machine (ATM)

Printers, Digital Cameras, Automobiles, Digital Watches, ATMs

Which of these is used to send SMS text messages to selected users or groups of users? a) Pull notification services b) Replay notification distribution (RND) c) Push notification services d) MAM mass SMS

Push notification services

A form of messaging that allows you to speak to others outside the country without having to download 3rd party apps such as WhatsApp a) SMS b) RCS c) MRM d) MMS

RCS

Which of the following technologies can convert a texting app into a live chat platform? a) MMS b) QR c) SMS d) RCS

RCS

What does RCS stand for? A) Resource Classification System B) Remote Control System C) Rich Communication Services D) Real-time Content Sharing

Rich Communication Services

Banko's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called? a) Rooting b) Sideloading c) Jailbreaking d) Ducking

Rooting

Which of the following is used to manage industrial control systems (ICSs)? a) SoC b) SCADA c) Real-time OS d) Embedded system

SCADA

What prevents a mobile device from being used until the user enters the correct passcode? a) Swipe identifier (SW-ID) b) Screen lock c) Screen timeout d) Touch swipe

Screen lock

What combines all pc components on a single chip? a) VDI b) FPGA c) MTSO d) SoC

SoC

What does SCADA stand for? A) System Control Data Assessment B) Sharing Control Data Acquisition C) Supervisory Content Data Action D) Supervisory Control and Data Acquisition

Supervisory Control and Data Acquisition

A mobile device with an active internet connection can be used to share that connection with other mobile devices through Bluetooth or WiFi describes: a) USB OTG b) Tethering c) Malicious USB cable d) Hotspots

Tethering

Hakaku needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution? a) MCCM b) UEM c) MDM d) MMAM

UEM

Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki's advice regarding it. Which of the following would Enki NOT tell him? a) A device connected via USB OTG can function as a peripheral for external media access b) A device connected via USB OTG can function as a host c) USB OTG is only available for connecting Andriod devices to a subnotebook d) Connecting a mobile device to an infected computer using USB OTG could allow malware to be sent to that device

USB OTG is only available for connecting Andriod devices to a subnotebook

Which of the following digital features are included in vehicles? [Choose all that apply] A) USB B) Near Field Communication C) Bluetooth D) GPS

USB, Bluetooth, GPS

What does UEM stand for? A) Unified Endpoint Management B) User Endpoint Monitoring C) Universal Encryption Method D) User Environment Management

Unified Endpoint Management

Which of the following vulnerabilities can exist in System control and Data Acquisition (SCADA)? [Choose all that apply] A) Unmonitored system B) Inadequate input validation C) Weak passwords D) Poor update management

Unmonitored system, Inadequate input validation, Weak passwords, Poor update management

Which enterprise deployment model of mobile devices stores sensitive applications and data on a remote server that you can access through a smartphone? a) VDI b) CYOD c) BYOD d) COPE

VDI

Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates? a) OEMs are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Andriod start to look the same through updates b) Because many of the OEMs have modified Andriod, they are reluctant to distribute updates that could potentially conflict with their changes c) Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks d) Because OEMs want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would continue to use indefinitely.

Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks


संबंधित स्टडी सेट्स

Hospitalized child/communication

View Set

International Business Chapter 5

View Set

2.2.7 Introduction to Computers Quiz

View Set

Chapter 1, MH chapter 1: Me, Meds, Milieu, Chapter 2, mh ch 2 keltner, Chapter 3, mh ch 3 keltner evolve and notes, Chapter 4, Psychiatric Mental Health Nursing Chapter 4, mh ch 4 evolve and notes, Chapter 5

View Set

CHAPTER 2: ORGANIZING AND VISUALIZING VARIABLES

View Set

UNIT #1 Review Activity - Diffusion & Osmosis

View Set