Quiz: Module 06 Mobile and Embedded Device Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is dead code?

A section of an application that executes but performs no meaningful function

Yusuf has been asked to experiment with different hardware to create a controller for a new device on the factory floor. He needs a credit-card-sized motherboard that has a microcontroller instead of a microprocessor. Which would be the best solution?

Arduino

In a job interview, Deniz asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?

CYOD (Choose Your Own Device)

What is another name for runtime verification?

Dynamic code analysis

Ahmet is explaining to his team members the security constraints that have made it a challenge to protect a new embedded system. Which of the following would Ahmet NOT include as a constraint?

Ease of Use

What enforces the location in which an app can function by tracking the location of the mobile device?

Geofencing

What is the process of identifying the geographical location of a mobile device?

Geolocation

Cahill is writing an application using SecDevOps and wants to prevent XSS and CSRF attacks. What coding technique would he use?

Input validation

What does containerization do?

It separates personal data from corporate data.

Which of these is NOT a security feature for locating a lost or stolen mobile device?

Last known good configuration

Which tool manages the distribution and control of apps?

MAM (Mobile Application Management)

What allows a device to be managed remotely?

MDM (Mobile Device Management)

Which of the following is NOT an advantage of COPE for an enterprise?

More oversight

Which of these is considered the strongest type of pass code to use on a mobile device?

Password

Which type of OS is typically found on an embedded system?

RTOS (Real Time Operating System)

Ozan has received a phone call from his supervisor that a new employee has attempted to download and install an unapproved app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called?

Rooting

Musa needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution?

UEM

Ceyhun received a request by a technician for a new portable computer. The technician noted that they wanted USB OTG support and asked Ceyhun's advice regarding it. Which of the following would Ceyhun NOT tell them is an advantage?

USB OTG is only available for connecting Android devices to a portable computer.

Eren has been asked to provide information regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Eren NOT list in their report as a factor in the frequency of Android firmware OTA updates?

Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks.

Which of the following is NOT a means by which untrusted content can be sent to a mobile device?

XRX


Set pelajaran terkait

God's attributes: Omniscience, Immutability + Free will - AS Philosophy

View Set

module 2 - Oxygenation & perfusion questions

View Set

Care for Patients With Musculoskeletal Trauma

View Set

Anthropology Test Questions Chapter 2

View Set

Experiment 5: Simple Distillation and Gas Chromatography

View Set