Quiz 5 Security +
What PIN is considered to be the most commonly used PIN?
1234
Select the proprietary wireless network technology that is used primarily by sensors for communicating data.
ANT
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?
Anti-climb
What type of OS in firmware is designed to manage a specific device like a video game console?
Appliance OS
Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a:
Cable Lock
What type of technology can add geographical identification data to media such as digital photos taken on a mobile device?
GPS tagging
Which OS hardening technique removes all unnecessary features that may compromise an operating system?
Kernal Pruning
What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access?
OTG (USB On-the-Go)
What publicly released software security update is intended to repair a vulnerability?
Patch
Which of the following is a popular type of removable data storage used on mobile devices?
SD
A Wi-Fi enabled microSD card is an example of what type of device?
SDIO
What security standard was introduced in conjunction with UEFI?
Secure Boot
What software methodology includes security automation?
Secure DevOps
What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?
Service pack
What portable computing devices, designed for user convenience, have a sensor called an accelerometer that senses vibrations and movements that can determine the orientation of the device?
Tablets
Which of the following selections is not one of the features provided by a typical MDM?
Track stolen devices
Which of the following is NOT an Android Smart Lock configuration option?
User device detection
What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?
antivirus software
Which management system is used to support the creation and subsequent editing and modification of digital content by multiple employees?
content management
Which option allows a mobile device to be configured so that the device automatically unlocks and stays unlocked until a specific action occurs?
context-aware authentication
Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise?
increased internal service
What monitors emails for spam and other unwanted content to prevent these messages from being delivered?
mail gateway
In Microsoft Windows, what type of templates are a collection of security configuration settings?
security
What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?
Enable a lock screen