Chapter 10

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

d. A video

(BYUIQ) A QR code can't contain which of the following items directly? a. A URL b. A phone number c. An email address d. A video

a. Web-based computers are limited to web apps

(BYUIQ) How does a web-based computer differ from a subnotebook computer? a. Web-based computers are limited to web apps b. Subnotebook computers cannot utilize browsers c. Web-based computers are smaller than subnotebooks d. Subnotebook computers only run Windows

a. With reset to factory settings

(BYUIQ) How would an android phone prevent data from being compromised by a brute-force attack? a. With reset to factory settings b. Encrypted passwords c. Extended lookout period d. Pin number

d. Geo-fencing

(BYUIQ) How would an app be restricted by MDMs based on geographical criteria? a. Location services b. Geo-tagging c. Remote lock d. Geo-fencing

c. Removable media storage

(BYUIQ) Select below the item that is not considered to be a basic characteristic of mobile devices: a. Small form factor b. Mobile operating system c. Removable media storage d. Data synchronization capabilities

c. Extreme Capacity (SDXC)

(BYUIQ) Select below the option that is not one of the SD format card families: a. Standard capacity (SDSC) b. High capacity (SDHC) c. Extreme Capacity (SDXC) d. Secure Digital Input Output (SDIO)

d. Web-based

(BYUIQ) Select below the type of computing device that uses a limited version of the Linux operating system and uses a web browser with an integrated media player: a. Tablet b. Notebook c. Netbook d. Web-based

b. Mobile Device Management (MDM)

(BYUIQ) What type of management system below can help facilitate asset tracking? a. Wireless Device Management (WDM) b. Mobile Device Management (MDM) c. Extended Device Management (EDM) d. Total Device Management (TDM)

b. Automotive industry in Japan

(BYUIQ) Where did QR codes originally come from and for which industry? a. Shipping industry in China b. Automotive industry in Japan c. Aviation industry across the world d. Consumer products in the US

b. Hardware limits upgrading the OS

(BYUIQ) Which of the following is NOT an accurate description of a laptop? a. Replicates functionality of a desktop b. Hardware limits upgrading the OS c. Integrated optical drive d. Includes fans

a. 100% secure connection

1. Which technology is NOT a characteristic of a mobile device? a. 100% secure connection b. small form factor c. local nonremovable data storage d. data synchronization capabilities

a. image

10. Which of these can a QR code NOT contain? a. image b. URL c. email address d. phone number

d. lock screen

11. What prevents a mobile device from being used until the user enters the correct passcode? a. swipe identifier (SW-ID) b. keyboard c. touch pad d. lock screen

a. reset to factory settings

12. Bob has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. This means that Bob's mobile device is configured to ____. a. reset to factory settings b. extend the lockout period c. use PIN codes as passcodes d. double the amount of time he is prevented from accessing his device

d. It separates personal data from corporate data.

13. What does containerization do? a. It splits operating system functions only on specific brands of mobile devices. b. It places all keys in a special vault. c. It slows down a mobile device to half speed. d. It separates personal data from corporate data.

a. mobile device management (MDM)

14. What allows a device to be managed remotely? a. mobile device management (MDM) b. mobile application management (MAM) c. mobile resource management (MRM) d. mobile wrapper management (MWM)

b. last known good configuration

15. Which of these is NOT a security feature for locating a lost or stolen mobile device? a. remote lockout b. last known good configuration c. alarm d. thief picture

b. geo-fencing

16. What enforces the location in which an app can function by tracking the location of the mobile device? a. location resource management b. geo-fencing c. geo-tagging d. Graphical Management Tracking (GMT)

b. cost increases

17. Which of these is NOT an advantage of BYOD for an organization? a. flexibility b. cost increases c. increased employee performance d. reduced internal service

a. subnotebook

18. Which mobile device is the smallest? a. subnotebook b. laptop c. notebook d. desktop

b. on the Internet

19. Where does a web-based computer store user files? a. on its hard disk drive b. on the Internet c. on a microSD card d. on a Type II PC card

c. operating system

2. Each optional feature is found on most mobile devices EXCEPT ____. a. digital camera b. microphone c. operating system d. removable storage media

c. Low-Capacity

20. Which of these is NOT a type of SD card? a. Standard-Capacity b. High-Capacity c. Low-Capacity d. eXtended-Capacity

c. laptop

3. Which type of computer most closely resembles a desktop computer? a. notebook b. subnotebook c. laptop d. netbook

b. ease of use

4. Tablet computers are designed for ____. a. processing capabilities b. ease of use c. wireless connection speed d. hardware upgrades

a. personal digital assistant (PDA)

5. One of the first mobile devices was a ____. a. personal digital assistant (PDA) b. tablet c. smartphone d. notebook

a. smallSD

6. Which of these is NOT a size of SD cards? a. smallSD b. miniSD c. microSD d. full SD

c. Public networks are faster than local networks and can spread malware more quickly to mobile devices.

7. Which of these is NOT a risk of connecting a mobile device to a public network? a. Public networks are beyond the control of the employee's organization. b. Public networks may be susceptible to man-in-the-middle attacks. c. Public networks are faster than local networks and can spread malware more quickly to mobile devices. d. Replay attacks can occur on public networks.

c. location services

8. Mobile devices using ____ are at increased risk of targeted physical attacks. a. GPS b. captive portals c. location services d. Internet filters

b. Android apps can be sideloaded.

9. What is one reason Android devices are considered to be at a higher security risk than iOS devices? a. iOS has been available longer and has more of its vulnerabilities worked out. b. Android apps can be sideloaded. c. All Android apps are free. d. Apple apps are written in a more secure binary language.


Set pelajaran terkait

OCR Biology The circulatory system ( heart, blood & blood vessels)

View Set

Language Arts 9 - ELA3009 - T4L Improving Vocabulary with Word Parts and Context Clues Assignment

View Set

NUR 3066C: Health Assessment Chapter 2: The Health History and Interview

View Set

COVID 19: Treatment and Prevention (Part I)

View Set

Chapter 6: Energy Flow in the Life of a Cell

View Set

Unit 6 Test Answers because I'm a ƒaguette

View Set