Chapter 10

Ace your homework & exams now with Quizwiz!

What is the wireless protocol that is responsible for sending information wirelessly from one device to another device, in a robust and flexible manner?

ANT

What enterprise deployment model allows users to use their personal mobile devices for business purposes?

BYOD

Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices?

COPE

Which option allows a mobile device to be configured so that the device automatically unlocks and says unlocked until a specific action occurs? A. Selected context authentication B. Context-aware authentication C. User designated authentication D. Trigger locking

Context-aware authentication

An embedded system is computer hardware and software contained within a smaller system that is designed for a specific function. (True or False)

False

Virtual machines store sensitive applications and data on a remote server that is accessible through a smartphone. (True or False)

False

What type of technology can add geographical identification data to media such as digital photos taken on a mobile device?

GPS Tagging

What systems control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control devices such as valves, pumps, and motors without the need for human intervention?

ICS

Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise? A. Management Flexibility B. Increased Internal Service C. Increased Employee Performance D. Less Oversight

Increased Internal Service

Mobile devices with global positioning system (GPS) abilities typically use:

Location Services

How could an administrator initially manage applications on mobile devices using a technique called "app wrapping?"

Mobile Application

What type of management system below can help manage devices remotely? A. Wireless Device Management B. Mobile Device Management C. Total Device Management D. Extended Device Management

Mobile Device Management

What type of update service can Apple users take advantage of to update their operating systems via wireless carriers?

OTA

What type of software is specifically designed for a SoC in an embedded system?

RTOSterm-19

What helps companies avoid data privacy issues and legal concerns regarding a user's personal data?

Storage Segmentation

A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer?

Subnotebook

Which of the following selections is not one of the features provided by a typical MDM? A. Rapidly deploy new mobile devices B. Discover devices accessing enterprise systems C. Track stolen devices D. Enforce encryption settings

Track stolen devices

Some mobile devices can be configured so that the device automatically unlocks and stays unlocked until a specific action occurs. (True or False)

True

Tethering may allow an unsecured mobile device to infect other mobile devices or the corporate network.(True or False)

True

Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media player. A. Tablet B. Notebook C. Netbook D. Web-based

Web-based


Related study sets

Business Communications, Chapter 7,8,9,10

View Set

Unit 4: Embryology and Cell Reproduction Methods

View Set

Chapter 6 life insurance premiums, proceeds and beneficiaries xcel

View Set

813 CH 44: Loss, Grief, Dying - QUIZ 6

View Set

Chapter 4: Project Integration Management Part 2

View Set

Essential Questions #1 (Spanish-English)

View Set

MARK 201 Exam 1 Study Guide - Multiple Choice Questions

View Set