security+ 5
What is the maximum distance supported by Bluetooth 5.x? 50 feet 100 feet 200 feet 20 feet
200 feet
Which of the following spectrums are used by wireless networks? [Choose all that apply] 1.2 GHz 3.6 GHz 5 GHz 2.4 GHz
5 GHz 2.4 GHz
Which of the following mobile device connection methods has a coverage area divided into hexagon-shaped cell transmitters that can measure up to 10 square miles installed in every city? Cellular telephony network Infrared Wi-Fi Bluetooth
Cellular telephony network
Which of the following are examples of embedded systems? [Choose all that apply] Digital Watches Digital Cameras Automatic Teller Machine (ATM) Automobiles Printers
Digital Watches Digital Cameras Automatic Teller Machine (ATM) Automobiles Printers
Which of the following Unified Endpoint Management (UEM) features can help an IT administrator manage and administer IT assets? [Choose all that apply] User provisioning Operating system deployment Software deployment Remote management License Management
Operating system deployment Software deployment Remote management License Management
Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki's advice regarding its. Which of the following would Enki NOT tell him? a. A device connected via USB OTG can function as a peripheral for external media access. b. A device connected via USB OTG can function as a host. c. USB OTG is only available for connecting Android devices to a subnotebook. d. Connecting a mobile device to an infected computer using USB OTG could allow malware to be sent to that device.
c. USB OTG is only available for connecting Android devices to a subnotebook.
Agape has been asked to experiment with different hardware to create a controller for a new device on the factory floor. She needs a credit-card-sized motherboard that has a microcontroller instead of a microprocessor. Which would be the best solution? a. FPGA b. SoC c. Raspberry Pi d. Arduino
d. Arduino
Akira is explaining to his team members the security constraints that have made it a challenge for protecting a new embedded system. Which of the following would Akira NOT include as a constraint? a. Power b. Authentication c. Cost d. Availability
d. Availability
What is the process of identifying the geographical location of a mobile device? a. Geomonitoring b. Geotracking c. GeoID d. Geolocation
d. Geolocation
Hakaku needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution? a. MCCM b. MDM c. MMAM d. UEM
d. UEM
Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates? a. Because OEMs want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely. b. Because many of the OEMs have modified Android, they are reluctant to distribute updates that could potentially conflict with their changes. c. OEMs are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates. d. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks.
d. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks.
Which type of sensors can be included in an Internet of Things (IoT) device? [Choose all that apply] Acceleration Temperature Humidity Accelerometer Gyro
Acceleration Temperature Humidity Accelerometer Gyro
Which of the following types of attacks are possible on the building automation systems - the building's heating, ventilation and air conditioning (HVAC) systems? [Choose all that apply] Buffer overflow Cross-site scripting Hardcoded secrets Path traversal Authentication bypass
Buffer overflow Cross-site scripting Hardcoded secrets Path traversal Authentication bypass
In which of the following mobile device deployment models are employees supplied a chosen device paid for by their company for both professional and personal use? COPE VDI CYOD BYOD
COPE
In his technical job interview, Mohan asks about the company policy regarding smartphones. He is told that employees may choose from a limited list of approved devices, but he must pay for the device himself. The company will provide him with a monthly stipend to offset the cost. Which type of enterprise deployment model does this company support? CYOD COD COPE BYOD
CYOD
Which of the following digital features are included in vehicles? [Choose all that apply] Near Field Communication GPS Bluetooth USB
GPS Bluetooth USB
Ramesh is very active on social media. He visits a lot of pages and views a lot of photos. He also uploads most of his photos to social media sites such as Facebook and Instagram. By doing this, he can become a victim of which of the following risks? GPS tagging Tethering Unauthorized recording Firmware over-the-air
GPS tagging
Which of the following is the process of identifying the geographical location of a mobile device? Geotracking GeoIDing Geomonitoring Geolocation
Geolocation
Through which of the following mobile connection vulnerabilities can attackers eavesdrop on data transmissions and view sensitive information? Hotspots USB OTG Malicious USB cable Tethering
Hotspots
Which of the following mobile management technologies supports the creation and subsequent editing and modification of digital content by multiple employees and can also include edit history tracking, version control, indexing, and searching? MCM UEM MAM MDM
MCM
Rohan has been appointed as the chief information security officer at a finance company. At a board meeting on "Information Security Policy Design & Enforcement," he proposes a mobile management solution that provides a high degree of control over a device but a lower level of control on the apps. Applying your knowledge of mobile device security, which of the following mobile management technologies should he suggest to fulfill the requirement? MDM UEM MCM MAM
MDM
Which of the following features of Mobile Device Management (MDM) can be used by an organization? [Choose all that apply] Password enforcement Encryption Remote Wipe Geofencing Remote Location
Password enforcement Encryption Remote Wipe Geofencing Remote Location
Which of the following vulnerabilities can exist in System control and Data Acquisition (SCADA)? [Choose all that apply] Poor update management Inadequate input validation Weak passwords Unmonitored system
Poor update management Inadequate input validation Weak passwords Unmonitored system
John works in a nuclear power plant. He discovered a worm that was actively targeting Windows computers that manage large-scale SCADA systems. The malware attempted to gain administrative access to other computers through the network to control the SCADA system. Which of the following malware can do all this damage? Stuxnet WannaCry ILOVEYOU Emotet
Stuxnet
Which of the following method is used in sideloading? Wireless USB Bluetooth Mobile network
USB
Sherlin was asked by his team lead about a method of connecting devices that replaces their current wired local area network (LAN). Which of the following should he suggest? Wi-Fi Cellular Infrared NFC
Wi-Fi
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document? a. Apple uses file-based encryption to offer a higher level of security. b. All modern versions of mobile device OS encrypt all user data by default. c. Data backed up to an Apple or Google server could be unlocked by a court order. d. Encryption occurs when the mobile device is locked.
a. Apple uses file-based encryption to offer a higher level of security.
Which tool manages the distribution and control of apps? a. MAM b. MDM c. MCM d. MFM
a. MAM
What allows a device to be managed remotely? a. Mobile device management (MDM) b. Mobile resource management (MRM) c. Mobile wrapper management (MWM) d. Mobile application management (MAM)
a. Mobile device management (MDM)
Which of these is used to send SMS text messages to selected users or groups of users? a. Push notification services b. MAM mass SMS c. Pull notification services d. Replay notification distribution (RND)
a. Push notification services
Which type of OS is typically found on an embedded system? a. RTOS b. OTG c. SoC d. COPE
a. RTOS
What prevents a mobile device from being used until the user enters the correct passcode? a. Screen lock b. Touch swipe c. Swipe identifier (SW-ID) d. Screen timeout
a. Screen lock
Which of these is NOT a security feature for locating a lost or stolen mobile device? a. Remote lockout b. Last known good configuration c. Alarm d. Thief picture
b. Last known good configuration
Which of the following is NOT a context-aware authentication? a. On-body detection b. Trusted contacts c. Trusted devices d. Trusted places
b. Trusted contacts
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support? a. COPE b. Corporate owned c. CYOD d. BYOD
c. CYOD
What enforces the location in which an app can function by tracking the location of the mobile device? a. Location resource management b. GPS tagging c. Geofencing d. Graphical Management Tracking (GMT)
c. Geofencing
What does containerization do? a. It slows down a mobile device to half speed. b. It places all keys in a special vault. c. It separates personal data from corporate data. d. It splits operating system functions only on specific brands of mobile devices.
c. It separates personal data from corporate data.
Which of these is considered the strongest type of passcode to use on a mobile device? a. PIN b. Draw connecting dots pattern c. Password d. Fingerprint swipe
c. Password
Banko's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called? a. Ducking b. Jailbreaking c. Rooting d. Sideloading
c. Rooting
Which of the following technologies can convert a texting app into a live chat platform? a. MMS b. SMS c. QR d. RCS
d. RCS rich communication services (RCS), which can convert a texting app into a live chat platform and supports pictures, videos, location, stickers, and emojis.