CompTIA Module 5 Review
What does COPE stand for? A) Corporate Oriented Product Enhancement B) Corporate Operations and Performance Enhancement C) Corporate-Owned, Personally-Enabled D) Cooperative Open-source Platform Environment
Corporate-Owned, Personally-Enabled
What does SoC stand for? A) Security Operations Center B) System on a Chip C) State of Connection D) Service-oriented Computing
System on a Chip
What does containerization do? a) It splits operating system functions only on specific brands of mobile devices b) it places all kets in a special vault c) it slows down a mobile device to half speed d) it separates personal data from corporate data
it separates personal data from corporate data
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document? a) All modern versions of mobile devices OS encrypt all user data by default b) Encryption occurs when the mobile device is locked c) Apple uses file-based encryption to offer a higher level of security d) Incorrect. This statement is accurate
Apple uses file-based encryption to offer a higher level of security
Agape has been asked to experiment with different hardware to create a controller for a new device on the factory floor. She needs a credit-card-sized motherboard that has a microcontroller INSTEAD of a microprocessor. Which would be the best solution? a) Arduino b) Rasberry Pi c) SoC d) FPGA
Arduino
Which of the following types of attacks are possible on the building automation systems - the building's heating, ventilation and air conditioning (HVAC) systems? [Choose all that apply] A) Authentication bypass B) Hardcoded secrets C) Path traversal D) Cross-site scripting E) Buffer overflow
Authentication bypass, Hardcoded secrets, Path traversal, Cross-site scripting, Buffer overflow
Akira is explaining to his team members the security constraints that have made it a challenge for protecting a new embedded system. Which of the following would Akira NOT include as a constraint? a) Authentication b) Cost c) Power d) Availability
Availability
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support? a) CYOD b) COPE c) BYOD d) Corporate Owned
CYOD
This is a hardware "chip" that can be programmed by a user to carry out one or more logical operations a) SoC b) SCADA c) FPGA d) MDM
FPGA
What does FPGA stand for? a) File and Printer Gateway Adapter b) Fully Protected Gateway Association c) Fast Performance Global Access d) Field-Programmable Gate Array
Field-Programmable Gate Array
What is the process of identifying the geographical location of a mobile device? a) Geotracking b) Geolocation c) GeoID d) Geomonitoring
Geolocation
Which type of sensors can be included in an Internet of Things (IoT) device? [Choose all that apply] A) Humidity B) Acceleration C) Temperature D) Accelerometer E) Gyro
Humidity, Acceleration, Temperature, Accelerometer, Gyro
A security analyst is securing smartphones and laptops for a highly mobile workforce. Priorities include: -Remote wipe capabilities -Geolocation services -Patch management and reporting -Mandatory screen locks -Ability to require passcodes and pins -Ability to require encryption Which of the following would best meet these requirements? a) Implementing MDM software b) Deploying relevant group policies to the devices c) installing full device encryption d) Removing administrative rights to the devices
Implementing MDM software
What does ICS stand for? A) Industrial Classification System B) Industrial Control Systems C) Industrial Communication Services D) Indistinctive Content Sharing
Industrial Control Systems
Banko's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Apple smartphone. What is this called? a) Rooting b) Sideloading c) Jailbreaking d) Ducking
Jailbreaking
Significant loopholes exist in mobile device data-in-transit and data-at-rest. Which of the following is not one of the loop-holes a) Apple and Google possess decryption keys necessary to unlock data on their servers b) Carriers build surveillance capabilities into their networks which allows law enforcement agencies to collect data-in-transit c) Courts can server orders to Apple and Google to provide data stored on their servers d) Leakage of PCI DSS encrypted data
Leakage of PCI DSS encrypted data
UEM is a combo of what other 3 mobile management tools? a) MCM b) MAM c) MMS d) RCS e) MDM
MCM, MDM, MAM
A form of messaging that allows you to send audio messages, photos, and videos. Select the best answer a) SMS b) RCS c) Instant Messaging d) MMS
MMS
What does MAM stand for? A) Metadata Access Management B) Master Access Manager C) Multi-factor Authentication Module D) Mobile Application Management
Mobile Application Management
What does MCM stand for? A) Mobile Control Mechanism B) Mobile Credential Manager C) Multi-layered Communication Module D) Mobile Content Management
Mobile Content Management
What allows a device to be managed remotely? a) Mobile Device Management (MDM) b) Mobile Application Management (MAM) c) Mobile Resource Management (MRM) d) Mobile Wrapper Management (MWM)
Mobile Device Management (MDM)
What does MMS stand for? A) Multimedia Messaging Service B) Mobile Messaging System C) Managed Monitoring Solution D) Message Manipulation System
Multimedia Messaging Service
What does OTA stand for A) Online Technical Assistance B) Over-The-Air C) Open Threat Analysis D) Operational Technology Assessment
Over-The-Air
Security risks associated with using mobile devices include all of the following except: a) Device vulnerabilities b) Connection vulnerabilities c) Patch verification d) Accessing untrusted content
Patch verification
Which of the following are examples of embedded systems? [Choose all that apply] A) Printers B) Digital Cameras C) Automobiles D) Digital Watches E) Automatic Teller Machine (ATM)
Printers, Digital Cameras, Automobiles, Digital Watches, ATMs
Which of these is used to send SMS text messages to selected users or groups of users? a) Pull notification services b) Replay notification distribution (RND) c) Push notification services d) MAM mass SMS
Push notification services
A form of messaging that allows you to speak to others outside the country without having to download 3rd party apps such as WhatsApp a) SMS b) RCS c) MRM d) MMS
RCS
Which of the following technologies can convert a texting app into a live chat platform? a) MMS b) QR c) SMS d) RCS
RCS
What does RCS stand for? A) Resource Classification System B) Remote Control System C) Rich Communication Services D) Real-time Content Sharing
Rich Communication Services
Banko's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called? a) Rooting b) Sideloading c) Jailbreaking d) Ducking
Rooting
Which of the following is used to manage industrial control systems (ICSs)? a) SoC b) SCADA c) Real-time OS d) Embedded system
SCADA
What prevents a mobile device from being used until the user enters the correct passcode? a) Swipe identifier (SW-ID) b) Screen lock c) Screen timeout d) Touch swipe
Screen lock
What combines all pc components on a single chip? a) VDI b) FPGA c) MTSO d) SoC
SoC
What does SCADA stand for? A) System Control Data Assessment B) Sharing Control Data Acquisition C) Supervisory Content Data Action D) Supervisory Control and Data Acquisition
Supervisory Control and Data Acquisition
A mobile device with an active internet connection can be used to share that connection with other mobile devices through Bluetooth or WiFi describes: a) USB OTG b) Tethering c) Malicious USB cable d) Hotspots
Tethering
Hakaku needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution? a) MCCM b) UEM c) MDM d) MMAM
UEM
Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki's advice regarding it. Which of the following would Enki NOT tell him? a) A device connected via USB OTG can function as a peripheral for external media access b) A device connected via USB OTG can function as a host c) USB OTG is only available for connecting Andriod devices to a subnotebook d) Connecting a mobile device to an infected computer using USB OTG could allow malware to be sent to that device
USB OTG is only available for connecting Andriod devices to a subnotebook
Which of the following digital features are included in vehicles? [Choose all that apply] A) USB B) Near Field Communication C) Bluetooth D) GPS
USB, Bluetooth, GPS
What does UEM stand for? A) Unified Endpoint Management B) User Endpoint Monitoring C) Universal Encryption Method D) User Environment Management
Unified Endpoint Management
Which of the following vulnerabilities can exist in System control and Data Acquisition (SCADA)? [Choose all that apply] A) Unmonitored system B) Inadequate input validation C) Weak passwords D) Poor update management
Unmonitored system, Inadequate input validation, Weak passwords, Poor update management
Which enterprise deployment model of mobile devices stores sensitive applications and data on a remote server that you can access through a smartphone? a) VDI b) CYOD c) BYOD d) COPE
VDI
Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates? a) OEMs are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Andriod start to look the same through updates b) Because many of the OEMs have modified Andriod, they are reluctant to distribute updates that could potentially conflict with their changes c) Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks d) Because OEMs want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would continue to use indefinitely.
Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks