Cyber ch 10

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What PIN is considered to be the most commonly used PIN? 1234 4321 0000 7777

1234

Select the item that is not considered to be a basic characteristic of mobile devices. A small form factor A mobile operating system A removable media storage A data synchronization capabilities

A removable media storage

Select the proprietary wireless network technology that is used primarily by sensors for communicating data. ANT Bluetooth SCD USB

ANT

Which enterprise deployment model allows users to use their personal mobile devices for business purposes? BYOD COPE VDI CYOD

BYOD

Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices? BYOD COPE VDI CYOD

COPE

Which management system is used to support the creation and subsequent editing and modification of digital content by multiple employees? Extended management Content management Remote management Application management

Content management

Which specific option allows a mobile device to be configured so that the device atomically unlocks and stays unlocked until a specific action occurs? Selected context authentication Context-aware authentication User designated authentication Trigger locking

Context-aware authentication

What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password? Enable a smart card Enable a lock screen Enable a sleep time setting Enable a challenge-response screen

Enable a Lock Screen

MDM tools cannot provide the ability to detect and restrict jailbroken and rooted devices. True False

False

What type of technology can add geographical identification data to media such as digital photos taken on a mobile device? GPS locating GeoData tagging GPS marking GPS tagging

GPS tagging

Select the option that represents a wearable technology. Android iPhone Google Chromebook Google Glass

Google glass

How is the coverage area for a cellular telephony network usually divided in a typical city? Hexagon shaped cells Square shaped cells Triangle shaped cells Circular shaped cells

Hexagon shaped cells

What systems control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control devices such as valves, pumps, and motors without the need for human intervention? SCADA HVAC ICS RTOS

ICS

Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise? Management flexibility Increased internal service Increased employee performance Less oversight

Increased internal service

What type of management system below can help distribute and manage public and corporate apps? Wireless Device Management Mobile Device Management Total Device Management Extended Device Management

Mobile Device Management

How could an administrator initially manage applications on mobile devices using a technique called "app wrapping?" Mobile application management Extended application management Remote application management Cloud application management

Mobile application management

What type of update service can Apple users take advantage of to update their operating systems via wireless carriers? OTG COPE OTA VDI

OTA

What connection technology allows a mobile device with a USB connection to act as wither a host to a peripheral used for external media access? OTG COPE OTA VDI

OTG

What type of software is specifically designed for a SoC in an embedded system? SCADA HVAC ICS RTOS

RTOS

Which of the following frameworks requires a QR code or PIN on each IoT device fro authenticating it to the network, and used an Elliptic Curve Diffie-Hellman secure key exchange and a Transport Layer Security (TLS) tunnel? P2413 Standard European Union Telecomm Law and Regulations Security 2 (S2) framework Industrial Internet Security Framework (IISF)

Security 2 (S2) framework

Which of the following selections is not one of the features provided by a typical MDM? Rapidly deploy new mobile devices Discover devices accessing enterprise systems Track stolen devices Enforce encryption settings

Track stolen devices

Tethering may allow an unsecured mobile device to infect other tethered mobile devices or the corporate network. True False

True

The transmission time needed to repeat a signal from one earth station to another is approximately 250 milliseconds. True False

True

A QR code can't contain which of the following items directly? A URL A phone number An e-mail address A video

a video

Which of the following can replace using radio frequency (RF) for the communication media? ANT Bluetooth Repeaters Infrared

infrared

An embedded system is computer hardware and software contained within a smaller system that is designed for a specific function. True False

false

As a class, tablets are devices that closely resemble standard desktop computers. True False

false

The greatest asset of a mobile device-its security True False

false

Virtual machines store sensitive applications and data on a remote server that is accessed through a smartphone. True False

false

What mobile operating system below requires all applications to be reviewed and approved before they can be made available in the App store? Android Blackberry OS iOS Symbian

iOS

What process gives a user access to a file system on a mobile device with full permissions, essentially allowing the user to do anything on the device? Mirroring Jailbreaking Sideloading Carrier unlocking

jailbreaking

Mobile devices with Global Positioning System (GPS) abilities typically make use of: Weak passwords Location services Open networks Anti-virus software

location services

Which of the following systems is located in a satellite and regenerates a signal that is sent back to earth at another frequency? Repeater Cell transmitter RF receiver Modulator

repeater

A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer? Subnotebook Laptop Tablet Netbook

subnotebook

What portable computing devices, designed for user convenience, have a sensor called an accelerometer that senses vibrations and movements that can determine the orientation of the device? Laptops Notebooks Tablets Subnotebooks

tablets

Infrared light is next to visible light on the light spectrum. True False

true

Mobile devices using location services are at increased risk of targeted physical attacks. True False

true

Some mobile devices can be configured so that the device automatically unlocks and stays unlocked until a specific action occurs. True False

true

Which of the following is NOT an Android Smart Lock configuration setting? Trusted places detection On-body detection User device detection Trusted face

user device detection

Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media player. Tablet Notebook Netbook Web-based

web-based


Set pelajaran terkait

Chapter 19 - Documenting and Reporting

View Set

Career Enhancement Chapters 1-18

View Set

ASTR 103 TAMU CONCEPT QUIZ EXAM 4

View Set

Pathway of Blood Through the Heart

View Set

MicroEcon Midterm Practice Quizlet

View Set

Lockout Tagout for Affected Employees

View Set