security+ 5

Ace your homework & exams now with Quizwiz!

What is the maximum distance supported by Bluetooth 5.x? 50 feet 100 feet 200 feet 20 feet

200 feet

Which of the following spectrums are used by wireless networks? [Choose all that apply] 1.2 GHz 3.6 GHz 5 GHz 2.4 GHz

5 GHz 2.4 GHz

Which of the following mobile device connection methods has a coverage area divided into hexagon-shaped cell transmitters that can measure up to 10 square miles installed in every city? Cellular telephony network Infrared Wi-Fi Bluetooth

Cellular telephony network

Which of the following are examples of embedded systems? [Choose all that apply] Digital Watches Digital Cameras Automatic Teller Machine (ATM) Automobiles Printers

Digital Watches Digital Cameras Automatic Teller Machine (ATM) Automobiles Printers

Which of the following Unified Endpoint Management (UEM) features can help an IT administrator manage and administer IT assets? [Choose all that apply] User provisioning Operating system deployment Software deployment Remote management License Management

Operating system deployment Software deployment Remote management License Management

Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki's advice regarding its. Which of the following would Enki NOT tell him? a. A device connected via USB OTG can function as a peripheral for external media access. b. A device connected via USB OTG can function as a host. c. USB OTG is only available for connecting Android devices to a subnotebook. d. Connecting a mobile device to an infected computer using USB OTG could allow malware to be sent to that device.

c. USB OTG is only available for connecting Android devices to a subnotebook.

Agape has been asked to experiment with different hardware to create a controller for a new device on the factory floor. She needs a credit-card-sized motherboard that has a microcontroller instead of a microprocessor. Which would be the best solution? a. FPGA b. SoC c. Raspberry Pi d. Arduino

d. Arduino

Akira is explaining to his team members the security constraints that have made it a challenge for protecting a new embedded system. Which of the following would Akira NOT include as a constraint? a. Power b. Authentication c. Cost d. Availability

d. Availability

What is the process of identifying the geographical location of a mobile device? a. Geomonitoring b. Geotracking c. GeoID d. Geolocation

d. Geolocation

Hakaku needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution? a. MCCM b. MDM c. MMAM d. UEM

d. UEM

Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates? a. Because OEMs want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely. b. Because many of the OEMs have modified Android, they are reluctant to distribute updates that could potentially conflict with their changes. c. OEMs are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates. d. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks.

d. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks.

Which type of sensors can be included in an Internet of Things (IoT) device? [Choose all that apply] Acceleration Temperature Humidity Accelerometer Gyro

Acceleration Temperature Humidity Accelerometer Gyro

Which of the following types of attacks are possible on the building automation systems - the building's heating, ventilation and air conditioning (HVAC) systems? [Choose all that apply] Buffer overflow Cross-site scripting Hardcoded secrets Path traversal Authentication bypass

Buffer overflow Cross-site scripting Hardcoded secrets Path traversal Authentication bypass

In which of the following mobile device deployment models are employees supplied a chosen device paid for by their company for both professional and personal use? COPE VDI CYOD BYOD

COPE

In his technical job interview, Mohan asks about the company policy regarding smartphones. He is told that employees may choose from a limited list of approved devices, but he must pay for the device himself. The company will provide him with a monthly stipend to offset the cost. Which type of enterprise deployment model does this company support? CYOD COD COPE BYOD

CYOD

Which of the following digital features are included in vehicles? [Choose all that apply] Near Field Communication GPS Bluetooth USB

GPS Bluetooth USB

Ramesh is very active on social media. He visits a lot of pages and views a lot of photos. He also uploads most of his photos to social media sites such as Facebook and Instagram. By doing this, he can become a victim of which of the following risks? GPS tagging Tethering Unauthorized recording Firmware over-the-air

GPS tagging

Which of the following is the process of identifying the geographical location of a mobile device? Geotracking GeoIDing Geomonitoring Geolocation

Geolocation

Through which of the following mobile connection vulnerabilities can attackers eavesdrop on data transmissions and view sensitive information? Hotspots USB OTG Malicious USB cable Tethering

Hotspots

Which of the following mobile management technologies supports the creation and subsequent editing and modification of digital content by multiple employees and can also include edit history tracking, version control, indexing, and searching? MCM UEM MAM MDM

MCM

Rohan has been appointed as the chief information security officer at a finance company. At a board meeting on "Information Security Policy Design & Enforcement," he proposes a mobile management solution that provides a high degree of control over a device but a lower level of control on the apps. Applying your knowledge of mobile device security, which of the following mobile management technologies should he suggest to fulfill the requirement? MDM UEM MCM MAM

MDM

Which of the following features of Mobile Device Management (MDM) can be used by an organization? [Choose all that apply] Password enforcement Encryption Remote Wipe Geofencing Remote Location

Password enforcement Encryption Remote Wipe Geofencing Remote Location

Which of the following vulnerabilities can exist in System control and Data Acquisition (SCADA)? [Choose all that apply] Poor update management Inadequate input validation Weak passwords Unmonitored system

Poor update management Inadequate input validation Weak passwords Unmonitored system

John works in a nuclear power plant. He discovered a worm that was actively targeting Windows computers that manage large-scale SCADA systems. The malware attempted to gain administrative access to other computers through the network to control the SCADA system. Which of the following malware can do all this damage? Stuxnet WannaCry ILOVEYOU Emotet

Stuxnet

Which of the following method is used in sideloading? Wireless USB Bluetooth Mobile network

USB

Sherlin was asked by his team lead about a method of connecting devices that replaces their current wired local area network (LAN). Which of the following should he suggest? Wi-Fi Cellular Infrared NFC

Wi-Fi

Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document? a. Apple uses file-based encryption to offer a higher level of security. b. All modern versions of mobile device OS encrypt all user data by default. c. Data backed up to an Apple or Google server could be unlocked by a court order. d. Encryption occurs when the mobile device is locked.

a. Apple uses file-based encryption to offer a higher level of security.

Which tool manages the distribution and control of apps? a. MAM b. MDM c. MCM d. MFM

a. MAM

What allows a device to be managed remotely? a. Mobile device management (MDM) b. Mobile resource management (MRM) c. Mobile wrapper management (MWM) d. Mobile application management (MAM)

a. Mobile device management (MDM)

Which of these is used to send SMS text messages to selected users or groups of users? a. Push notification services b. MAM mass SMS c. Pull notification services d. Replay notification distribution (RND)

a. Push notification services

Which type of OS is typically found on an embedded system? a. RTOS b. OTG c. SoC d. COPE

a. RTOS

What prevents a mobile device from being used until the user enters the correct passcode? a. Screen lock b. Touch swipe c. Swipe identifier (SW-ID) d. Screen timeout

a. Screen lock

Which of these is NOT a security feature for locating a lost or stolen mobile device? a. Remote lockout b. Last known good configuration c. Alarm d. Thief picture

b. Last known good configuration

Which of the following is NOT a context-aware authentication? a. On-body detection b. Trusted contacts c. Trusted devices d. Trusted places

b. Trusted contacts

In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support? a. COPE b. Corporate owned c. CYOD d. BYOD

c. CYOD

What enforces the location in which an app can function by tracking the location of the mobile device? a. Location resource management b. GPS tagging c. Geofencing d. Graphical Management Tracking (GMT)

c. Geofencing

What does containerization do? a. It slows down a mobile device to half speed. b. It places all keys in a special vault. c. It separates personal data from corporate data. d. It splits operating system functions only on specific brands of mobile devices.

c. It separates personal data from corporate data.

Which of these is considered the strongest type of passcode to use on a mobile device? a. PIN b. Draw connecting dots pattern c. Password d. Fingerprint swipe

c. Password

Banko's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called? a. Ducking b. Jailbreaking c. Rooting d. Sideloading

c. Rooting

Which of the following technologies can convert a texting app into a live chat platform? a. MMS b. SMS c. QR d. RCS

d. RCS rich communication services (RCS), which can convert a texting app into a live chat platform and supports pictures, videos, location, stickers, and emojis.


Related study sets

Change and Power, Policy, and Politics

View Set

Chapter Seven Homework - Microeconomics

View Set

Chapter 14: Intrapartum Fetal Surveillance

View Set

Term 1 vocabulary 4 (Identidades)

View Set

entrepreneurial finance Exam 1 Chapters 1-5

View Set

FOXYLEARNING- Intro to Verbal Behavior

View Set