Chapter 10

Ace your homework & exams now with Quizwiz!

​Subnotebook

An ultrabook is an example of what type of a portable computer? ​Laptop ​Netbook ​Subnotebook ​Tablet

Ultra-Capacity

Which of the following is NOT part of the Secure Digital card family? Standard-Capacity Secure Digital Input Output eXtended-Capacity Ultra-Capacity

Unused features

Which of the following is a threat vector associated with mobile devices? Lockout settings Container encryption Unused features Access control

Full SD

Which of the following is typically used by video and digital cameras? MicroSD MiniSD Full SD StandardSD

Feature phone

Which of the following uses SMS messaging between devices? Feature phone MP3 player Ultrabook Subnotebook

image

Which of these can a QR code NOT contain? image URL email address phone number

Public networks are faster than local networks and can spread malware more quickly to mobile devices.

Which of these is NOT a risk of connecting a mobile device to a public network? Public networks are beyond the control of the employee's organization. Public networks may be susceptible to man-in-the-middle attacks. Public networks are faster than local networks and can spread malware more quickly to mobile devices. Replay attacks can occur on public networks.

last known good configuration

Which of these is NOT a security feature for locating a lost or stolen mobile device? remote lockout last known good configuration alarm thief picture

smallSD

Which of these is NOT a size of SD cards? smallSD miniSD microSD full SD

Low-Capacity

Which of these is NOT a type of SD card? Standard-Capacity High-Capacity Low-Capacity eXtended-Capacity

cost increases

Which of these is NOT an advantage of BYOD for an organization? flexibility cost increases increased employee performance reduced internal service

100% secure communication

Which technology is NOT a characteristic of a mobile device? 100% secure communication small form factor local nonremovable data storage data synchronization capabilities

laptop

Which type of computer most closely resembles a desktop computer? notebook subnotebook laptop netbook

A video

A QR code can't contain which of the following items directly? ​A URL ​A phone number ​An e-mail address ​A video

RS232

A laptop may have multiple hardware ports. Which of the following is not a typical port included on a laptop? Universal Serial Bus (USB) eSATA RJ-45 RS232

reset to factory settings

Bob has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. This means that Bob's mobile device is configured to _____. reset to factory settings extend the lockout period use PIN codes as passcodes double the amount of time he is prevented from accessing his device

subnotebook

Which mobile device is the smallest? subnotebook laptop notebook desktop

operating system

Each optional feature is found on most mobile devices EXCEPT _____. (Which one is required in all mobile devices?) digital camera microphone operating system removable storage media p 406

Mobile Application Management

How can an administrator manage applications on mobile devices using a technique called "app wrapping?" ​Mobile Application Management ​Extended Application Management ​Remote Application Management ​Cloud Application Management

Google Android OS can be modified by anyone

How does Google Android software differ from that of Apple? Google Android OS can be modified by anyone Google androids are not yet on the market Apple apps are less secure Google apps don't allow third-party downloads

Communicating with devices without the CPU

How does a bus mastering feature allow a CardBus to be more efficient when accessing data? Caching data within unused circuits Communicating with devices without the CPU Allowing backwards compatibility Increasing the bus size of PC cards

Web-based computers are limited to web apps

How does a web-based computer differ from a subnotebook computer? Web-based computers are limited to web apps Subnotebook computers cannot utilize browsers Web-based computers are smaller than subnotebooks Subnotebook computers only run Windows

location services

Mobile devices using _____ are at increased risk of targeted physical attacks. GPS captive portals location services Internet filters

Location services

Mobile devices with global positioning system (GPS) abilities typically make use of: Anti-virus software Location services Open networks Weak passwords

personal digital assistant (PDA)

One of the first mobile devices was a _____. personal digital assistant (PDA) tablet smartphone notebook

Google Glass

Select below the option that represents a wearable technology:​ ​iPhone ​Android ​Google Glass ​Google Chromebook

ease of use

Tablet computers are designed for _____. processing capabilities ease of use wireless connection speed hardware upgrades

ExpressCard

The PC Card and CardBus devices are being replaced by what technology? PCMCIA USB ExpressCard Firewire

lock screen

What prevents a mobile device from being used until the user enters the correct passcode? swipe identifier (SW-ID) keyboard touch pad lock screen

​Personal digital assistant (PDA)

What term below describes a hand-held mobile device that was intended to replace paper systems, and typically included an appointment calendar, an address book, a "to-do" list, a calculator, and the ability to record limited notes? ​Notebook ​Netbook ​Web-based ​Personal digital assistant (PDA)

​Inventory control

What term is used to describe the operation of stockrooms where mobile devices are stored prior to their dispersal to employees? ​Asset tracking ​Inventory control ​Device monitoring ​Access filtering

Automotive industry in Japan

Where did QR codes originally come from and for which industry? Shipping industry in China Automotive industry in Japan Aviation industry across the world Consumer products in the US

on the Internet

Where does a web-based computer store user files? on its hard disk drive on the Internet on a microSD card on a Type II PC card

68-pin connector

There are three types of PC cards that all share which common trait? 87 mm length 5.0 mm thickness 53 mm width 68-pin connector

Type I

What PC Card type is typically used for memory?​ ​Type I ​Type II ​Type III ​Type IV

mobile device management (MDM)

What allows a device to be managed remotely? mobile device management (MDM) mobile application management (MAM) mobile resource management (MRM) mobile wrapper management (MWM)

It separates personal data from corporate data.

What does containerization do? It splits operating system functions only on specific brands of mobile devices. It places all keys in a special vault. It slows down a mobile device to half speed. It separates personal data from corporate data.

geo-fencing

What enforces the location in which an app can function by tracking the location of the mobile device? location resource management geo-fencing geo-tagging Graphical Management Tracking (GMT)

Portability

What is considered the biggest vulnerability related to portable devices? Portability GPS capabilities Wireless connectivity USB ports

Android apps can be sideloaded.

What is one reason Android devices are considered to be at a higher security risk than iOS devices? iOS has been available longer and has more of its vulnerabilities worked out. Android apps can be sideloaded. All Android apps are free. Apple apps are written in a more secure binary language.

Extreme Capacity (SDXC)

​Select below the option that is not one of the SD format card families: ​Standard capacity (SDSC) ​High capacity (SDHC) ​Extreme Capacity (SDXC) ​Secure Digital Input Output (SDIO)


Related study sets

Chapter 30 Quiz Government Budgets and Fiscal Policy

View Set

CHAPTER 13 Provision of a Safe Environment

View Set

Natural Selection, Genetic Bottleneck, or Founder Effect

View Set

Chapter 10: Marketing with YouTube

View Set

Chapter 8. Structuring Organizations for Today's Challenges

View Set