Quiz: Module 05 Mobile, Embedded, and Specialized Device Security
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document? a. Data backed up to an Apple or Google server could be unlocked by a court order. b. All modern versions of mobile device OS encrypt all user data by default. c. Apple uses file-based encryption to offer a higher level of security. d. Encryption occurs when the mobile device is locked.
Apple uses file-based encryption to offer a higher level of security.
Agape has been asked to experiment with different hardware to create a controller for a new device on the factory floor. She needs a credit-card-sized motherboard that has a microcontroller instead of a microprocessor. Which would be the best solution? a. FPGA b. SoC c. Arduino
Arduino
Akira is explaining to his team members the security constraints that have made it a challenge for protecting a new embedded system. Which of the following would Akira NOT include as a constraint? a. Cost b. Authentication c. Availability d. Power
Availability
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support? a. BYOD b. CYOD c. Corporate owned d. COPE
CYOD
What enforces the location in which an app can function by tracking the location of the mobile device? a. Geofencing b. Location resource management c. Graphical Management Tracking (GMT) d. GPS tagging
Geofencing
What is the process of identifying the geographical location of a mobile device? a. Geolocation b. GeoID c. Geotracking d. Geomonitoring
Geolocation
What does containerization do? a. It splits operating system functions only on specific brands of mobile devices. b. It separates personal data from corporate data. c. It places all keys in a special vault.
It separates personal data from corporate data.
Which of these is NOT a security feature for locating a lost or stolen mobile device? a. Thief picture b. Alarm c. Last known good configuration d. Remote lockout
Last known good configuration
Which tool manages the distribution and control of apps? a. MFM b. MCM c. MDM d. MAM
MAM
What allows a device to be managed remotely? a. Mobile application management (MAM) b. Mobile device management (MDM) c. Mobile resource management (MRM) d. Mobile wrapper management (MWM)
Mobile device management (MDM)
Which of these is considered the strongest type of passcode to use on a mobile device? a. Draw connecting dots pattern b. Password c. PIN d. Fingerprint swipe
Password
Which of these is used to send SMS text messages to selected users or groups of users? a. Replay notification distribution (RND) b. MAM mass SMS c. Pull notification services d. Push notification services
Push notification services
Which of the following technologies can convert a texting app into a live chat platform? a. QR b. RCS c. MMS d. SMS
RCS
Which type of OS is typically found on an embedded system? a. RTOS b. SoC c. COPE d. OTG
RTOS
Banko's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called? a. Jailbreaking b. Sideloading c. Ducking d. Rooting
Rooting
What prevents a mobile device from being used until the user enters the correct passcode? a. Swipe identifier (SW-ID) b. Screen timeout c. Screen lock d. Touch swipe
Screen lock
Which of the following is NOT a context-aware authentication? a. Trusted places b. On-body detection c. Trusted contacts d. Trusted devices
Trusted contacts
Hakaku needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution? a. MCCM b. MMAM c. MDM d. UEM
UEM
Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki's advice regarding its. Which of the following would Enki NOT tell him? a. A device connected via USB OTG can function as a peripheral for external media access. b. A device connected via USB OTG can function as a host. c. USB OTG is only available for connecting Android devices to a subnotebook. d. Connecting a mobile device to an infected computer using USB OTG could allow malware to be sent to that device.
USB OTG is only available for connecting Android devices to a subnotebook.
Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates? a. OEMs are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates. b. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks. c. Because many of the OEMs have modified Android, they are reluctant to distribute updates that could potentially conflict with their changes. d. Because OEMs want to sell as many devices as possible, they have no financial incentive to update mobile device
Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks.