MODULE 5

Ace your homework & exams now with Quizwiz!

Walter's organization is in the beginning stages of a new project. His team is tasked with finding a tool that must have the following features, allowing it to be remotely managed by the organization: 1. must be able to apply default device settings 2. it must be able to approve or quarantine new mobile devices 3. it must be able to configure emails, calendars, contacts, and wi-fi profile settings 4. it must be able to detect and restrict jailbroken and rooted devices which tool should walter's team suggest, and why?

MDM, because it allows remote management and over the air updates

What allows a device to be managed remotely?

Mobile device management (MDM)

Simon is working in a telecom firm. Being an HOD, he was asked to suggest a lock pattern for their mobile devices with the following features: The device should have a prerecord of its user's walking and other body movement patterns, and on sensing any change in the regular movements, should be able to lock the device. Which lock pattern should Simon suggest?

On-body detection

Which of these is considered the strongest type of passcode to use on a mobile device?

Password

Which of these is used to send SMS text messages to selected users or groups of users?

Push notification services

Which of the following technologies can convert a texting app into a live chat platform?

RCS

Which type of OS is typically found on an embedded system?

RTOS

Which of the following sets consists of only the core features of a mobile or computing device?

Small form factor, mobile operating system, wireless data network interface for internet access, global positioning system, local non-removable data storage

Which of the following mobile devices features senses movements that it then uses to ensure the screen is always oriented uprighted

Accelerometer

Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document?

Apple uses file-based encryption to offer a higher level of security.

Agape has been asked to experiment with different hardware to create a controller for a new device on the factory floor. She needs a credit-card-sized motherboard that has a microcontroller instead of a microprocessor. Which would be the best solution?

Arduino

Sara is asked to create a controller for light sensors. When the light falls on the sensor, it needs to indicate when a particular object is moved from its original position. For this, she needs a credit card-sized motherboard with a microcontroller on it. Which option should she select?

Arduino

Which of the following devices is similar to Raspberry Pi

Arduino

Akira is explaining to his team members the security constraints that have made it a challenge for protecting a new embedded system. Which of the following would Akira NOT include as a constraint?

Availability

In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?

CYOD

Which of the following mobile device enterprise deployment models are implemented so that employees in an organization are offered a suite of security, reliability, and durability choices that the company has already approved?

Choose your own device (CYOD)

Zyan works for ABC Technology. The enterprise wants to provide smartphones to all its employees. They can choose from a limited list of approved mobile devices. But they need to pay for the device themselves. The company will pay them a monthly stipend. Which deployment method should Zyan suggest to meet his company's needs?

Choose your own device (CYOD)

Marcus is an information security architect at a product-based IT firm. He is responsible for developing policies for the most-secure mobile device enterprise-deploying model. The company will decide the level of choice and freedom for employees. Employees are supplied company-chosen and paid-for devices that they can use for both professional and personal activities. This action is performed under which enterprise deployment model?

Corporate-owned, personally enabled (COPE)

Dan uses his personal laptop for writing the script for an upcoming high-budget, highly anticipated movie. To keep the script private, he decided not to connect his laptop to any network and updated his system with the latest virus definitions and security patches. Which of the following is Dan's laptop still vulnerable to?

DDoS

Sean is an information security architect at a financial firm. As his first project, he must design and build an efficient, sure-shot, yet cost-effective solution to detect and prevent bank credit card fraud. How should Sean proceed?

Design a solution that keeps track of dates, times, locations of transactions, and geolocation of the authorized cell phone. When a user makes a purchase at a store, the bank can immediately check that the cell phone and the bank card are in the same place. If they are, the purchase is considered legitimate. But if they are not, then the payment is rejected.

Which of the following is the most secure encryption solution to adopt for a google android mobile device

File-based encryption

What is the process of identifying the geographical location of a mobile device?

Geolocation

What does containerization do?

It separates personal data from corporate data

Which of these is NOT a security feature for locating a lost or stolen mobile device?

Last known good configuration

Which tool manages the distribution and control of apps?

MAM

Banko's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called?

Rooting

What prevents a mobile device from being used until the user enters the correct passcode?

Screen lock

Which of the following is NOT a context-aware authentication?

Trusted contacts

Hakaku needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution?

UEM

Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki's advice regarding its. Which of the following would Enki NOT tell him?

USB OTG is only available for connecting Android devices to a subnotebook.

Which of the following vulnerabilities involves connecting a flash drive infected with malware to a mobile device?

USB-on-the-go (OTG)

Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates?

Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks.

In which of the following mobile devices connectivity methods are transmitters connected through a mobile telecommunications switching office (MTSO) that controls all of the transmitters in the cellular network and serves as the link between the cellular network and the wired telephone world?

cellular

What enforces the location in which an app can function by tracking the location of the mobile device?

geo-fencing

Photoplethysmography uses which type of light to measure heart rate on a wearable device?

green


Related study sets

Advanced Accounting Exam #2 (Ch. 3 & 4)

View Set

MedTerm Chapter 4 Self Test: Integrated Medicine

View Set

CCENT Chapter 8: Configuring Basic Switch Management

View Set