Network Security - Module 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document? A) Apple users file-based encryption to offer a higher level of security. B) All modern versions of mobile device OS encrypt all user data by default. C) Encryption occurs when the mobile device is locked. D) Data backed up to an Apple or Google server could be unlocked by a court order. (incorrect)

A) Apple users file-based encryption to offer a higher level of security. (?)

Which tool manages the distribution and control of apps? A) MAM B) MCM C) MDM D) MFM

A) MAM

Which type of OS is typically found on an embedded system? A) RTOS B) SoC C) OTG D) COPE

A) RTOS (Real-Time Operating System)

Which of these is considered the strongest type of passcode to use on a mobile device? A) Fingerprint swipe B) Password C) Draw connecting dots pattern D) PIN

B) Password

Which of these is used to send SMS text messages to selected users or groups of users? A) Pull notification services B) Push notification services C) MAM mass SMS (Incorrect) D) Replay notification distribution (RND)

B) Push notification services (?)

Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki's advice regarding its. Which of the following would Enki NOT tell him? A) Connecting a mobile device to an infected computer using USB OTG could allow malware to be sent to that device. B) USB OTG is only available for connecting Android devices to a subnotebook. C) A device connected via USB OTG can function as a peripheral for external media access. (Incorrect) D) A device connected via USB OTG can function as a host.

B) USB OTG is only available for connecting Android devices to a subnotebook. (?)

Agape has been asked to experiment with different hardware to create a controller for a new device on the factory floor. She needs a credit-card-sized motherboard that has a microcontroller instead of a microprocessor. Which would be the best solution? A) FPGA B) Raspberry Pi C) Arduino D) SoC

C) Arduino

In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support? A) BYOD (Incorrect) B) Corporate owned C) CYOD D) COPE

C) CYOD (?)

What is the process of identifying the geographical location of a mobile device? A) Geotracking (Incorrect) B) Geomonitoring C) Geolocation D) GeoID

C) Geolocation (?)

What does containerization do? A) It splits operating system functions only on specific brands of mobile devices. B) It slows down a mobile device to half speed. C) It separates personal data from corporate data. D) It places all keys in a special vault.

C) It separates personal data from corporate data.

Which of these is NOT a security feature for locating a lost or stolen mobile device? A) Thief Picture B) Alarm C) Last known good configuration D) Remote lockout

C) Last known good configuration

Which of the following is NOT a context-aware authentication? A) Trusted places B) Trusted Devices C) On-body detection D) Trusted contacts (incorrect)

C) On-body detection (?)

Akira is explaining to his team members the security constraints that have made it a challenge for protecting an embedded system. Which of the following would Akira NOT include as a constraint? A) Power B) Cost C) Authentication (incorrect) D) Availability

D) Availability (?)

What enforces the location in which an app can function by tracking the location of the mobile device? A) Location resource management B) GPS tagging C) Graphical Management Tracking (GMT) D) Geofencing

D) Geofencing

What allows a mobile device to managed remotely? A) Mobile Application Management (MAM) B) Mobile Resource Management (MRM) C) Mobile Wrapper Management (MWM) D) Mobile Device Management (MDM)

D) Mobile Device Management (MDM)

Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates? A) Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks. B) Because many of the OEMs have modified Android, they are reluctant to distribute updates that could potentially conflict with their changes. C) OEMs are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates. D) Because OEMs want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely. (Incorrect)

A) Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks. (?)

Which of the following technologies can convert a texting app into a live chat platform? A) SMS B) MMS (incorrect) C) RCS D) QR

C) RCS (?)

Banko's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called? A) Jailbreaking B) Sideloading C) Rooting D) Ducking

C) Rooting

What prevents a mobile device from being used until the user enters the correct passcode? A) Screen timeout B) Swipe identifier (SW-ID) C) Screen Lock D) Touch Swipe

C) Screen Lock

Hakaku needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution? A) UEM B) MDM C) MMAM D) MCCM

A) UEM (Unified Endpoint Management)


Set pelajaran terkait

Urinalysis and Body Fluids- Success questions

View Set

Chapter 4- Lesson 1, How to Use Context to Determine the Meaning of Words

View Set

Legal Environment of Business- Test 3 (Part 2)

View Set

LLB 301: Indian Code of Civil Procedure I

View Set

Mgmt 309 Exam 2: Chapter 20- Managing Operations, Quality, and Productivity

View Set