Security Chapter 10
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?
CYOD
Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo's opinion regarding its security. What would Paavo tell him about USB OTG security?
Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.
ANT is an enterprise mobile device deployment model.
False
An embedded system is computer hardware and software contained within a smaller system that is designed for a specific function.
False
As a class, tablets are devices that closely resemble standard desktop computers.
False
MAM comprises the tools to allow a device to be managed remotely by an organization.
False
MDM tools cannot provide the ability to detect and restrict jailbroken and rooted devices.
False
A friend of Ukrit told him that he has just downloaded and installed an app that allows him to circumvent the built-in limitations on his Apple iOS smartphone. What is this called?
Jailbreaking
Which tool manages the distribution and control of apps?
MAM
What allows a device to be managed remotely?
MDM (Mobile Device Management)
Which of the following technologies provides for pictures, video, or audio to be included in text messages?
MMS
What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access?
OTG
Which of these is NOT a risk of connecting a mobile device to a public network?
Public networks are faster than local networks and can spread malware more quickly to mobile devices.
Which type of OS is typically found on an embedded system?
RTOS
Which of the following selections is not one of the features provided by a typical MDM?
Track stolen devices
Mobile devices using location services are at increased risk of targeted physical attacks.
True
Some mobile devices can be configured so that the device automatically unlocks and stays unlocked until a specific action occurs.
True
Pakpao has been asked to provide research regarding a new company initiative to add Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Pakpao NOT list in his report as a factor in the frequency of Android firmware OTA updates?
Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks
Which technology is NOT a core feature of a mobile device?
physical keyboard
What prevents a mobile device from being used until the user enters the correct passcode?
screen lock
OTA stores sensitive applications and data on a remote server that is accessed through a smartphone.
False
Tethering may allow an unsecured mobile device to infect other tethered mobile devices or the corporate network.
True
Calista is designing the specifications for new laptop computers to be purchased by her company. She is comparing the different types and sizes of USB connections found on the devices. Which type USB connection would she NOT find on a laptop?
Type D
What is the process of identifying the geographical location of a mobile device?
geolocation
A class of mobile technology consists of devices that are worn by the user instead of carried.
wearable technology
Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media player.
web-based
What enforces the location in which an app can function by tracking the location of the mobile device?
geofencing
Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise?
increased reliance on the internal IT help desk
Which of these is NOT a security feature for locating a lost or stolen mobile device?
last know good configuration
Which of the following is NOT a type of passcode that can be entered in a mobile device?
mobile device access code
Which of these is considered the strongest type of passcode to use on a mobile device?
password
Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regarding a serious malware incident. What technology will she use?
push notification services
Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. Which configuration setting is enabled on Gaetan's mobile device?
reset to factory settings
A QR code can't contain which of the following items directly?
A video
The greatest asset of a mobile device-its security.
False
How is the coverage area for a cellular telephony network usually divided in a typical city?
Hexagonal shaped cells
What systems control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control devices such as valves, pumps, and motors without the need for human intervention?
ICS
Agape was asked to make a recommendation regarding short-range wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she NOT consider due to its slow speed and its low deployment levels today?
Infrared
What does containerization do?
It separates personal data from corporate data.
Which management system is used to support the creation and subsequent editing and modification of digital content by multiple employees?
content management