Unit 10 Quiz
What prevents a mobile device from being used until the user enters the correct passcode? screen lock swipe identifier (SW-ID) screen timeout touch swipe
screen lock
A friend of Ukrit told him that he has just downloaded and installed an app that allows him to circumvent the built-in limitations on his Apple iOS smartphone. What is this called? Rooting Sideloading Ducking Jailbreaking
Jailbreaking
Which tool manages the distribution and control of apps? MDM MFM MAM MCM
MAM
Which of the following technologies provides for pictures, video, or audio to be included in text messages? ANT MMS SMS QR
MMS
Which type of OS is typically found on an embedded system? COPE OTG RTOS SoC
RTOS
Calista is designing the specifications for new laptop computers to be purchased by her company. She is comparing the different types and sizes of USB connections found on the devices. Which type USB connection would she NOT find on a laptop? Mini Standard Type D Micro
Type D
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support? COPE CYOD Corporate-owned BYOD
CYOD
Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo's opinion regarding its security. What would Paavo tell him about USB OTG security? An unsecured mobile device could infect other tethered mobile devices or the corporate network. Subnotebooks do not support USB OTG. Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device. USB OTG uses strong security and the executive should have no concerns.
Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.
Agape was asked to make a recommendation regarding short-range wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she NOT consider due to its slow speed and its low deployment levels today? Infrared ANT NFC Bluetooth
Infrared
What enforces the location in which an app can function by tracking the location of the mobile device? Graphical Management Tracking (GMT) geofencing GPS tagging location resource management
geofencing
What is the process of identifying the geographical location of a mobile device? geotracking geoID geolocation geomonitoring
geolocation
Which of these is NOT a security feature for locating a lost or stolen mobile device? remote lockout thief picture last known good configuration alarm
last known good configuration
What allows a device to be managed remotely? mobile device management (MDM) mobile wrapper management (MWM) mobile resource management (MRM) mobile application management (MAM)
mobile device management (MDM)
Which of these is considered the strongest type of passcode to use on a mobile device? PIN password draw connecting dots pattern fingerprint swipe
password
Which technology is NOT a core feature of a mobile device? physical keyboard local non-removable data storage small form factor data synchronization capabilities
physical keyboard
Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regarding a serious malware incident. What technology will she use? push notification services MAM MCM COPE
push notification services
Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. Which configuration setting is enabled on Gaetan's mobile device? lock device reset to factory settings extend lockout period enable high security
reset to factory settings
What does containerization do? It places all keys in a special vault. It separates personal data from corporate data. It slows down a mobile device to half speed. It splits operating system functions only on specific brands of mobile devices.
It separates personal data from corporate data.
Which of these is NOT a risk of connecting a mobile device to a public network? Replay attacks can occur on public networks. Public networks may be susceptible to man-in-the-middle attacks. Public networks are faster than local networks and can spread malware more quickly to mobile devices. Public networks are beyond the control of the employee's organization.
Public networks are faster than local networks and can spread malware more quickly to mobile devices.
Pakpao has been asked to provide research regarding a new company initiative to add Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Pakpao NOT list in his report as a factor in the frequency of Android firmware OTA updates? Because OEMs and wireless carriers want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks. Because many of the OEMs had modified Android, they are reluctant to distribute updates that could potentially conflict with their changes. Both OEMs and wireless carriers are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates.
Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks.