Deck 10: Mobile and Embedded Device Security

ملء الشاشة (f)
exit full mode
سؤال
Select the option that represents a wearable technology.

A)Android
B)iPhone
C)Google Chromebook
D)Google Glass
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Infrared light is next to the visible light on the light spectrum.
سؤال
MDM tools cannot provide the ability to detect and restrict jailbroken and rooted devices.
سؤال
A QR code can't contain which of the following items directly?

A)A URL.
B)A phone number.
C)An e-mail address.
D)A video.
سؤال
Which management system is used to support the creation and subsequent editing and modification of digital content by multiple employees?

A)extended management
B)content management
C)remote management
D)application management
سؤال
What type of management system below can help distribute and manage public and corporate apps?

A)Wireless Device Management
B)Mobile Device Management
C)Total Device Management
D)Extended Device Management
سؤال
What can be enabled to prevent a mobile device from being used until a user enters the correct passcode,such as a pin or password?

A)Enable a smart card
B)Enable a lock screen
C)Enable a sleep time setting
D)Enable a challenge-response screen
سؤال
The transmission time needed to repeat a signal from one earth station to another is approximately 250 milliseconds.
سؤال
Virtual machines store sensitive applications and data on a remote server that is accessed through a smartphone.
سؤال
The greatest asset of a mobile device-its security.
سؤال
A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer?

A)subnotebook
B)laptop
C)tablet
D)netbook
سؤال
Which of the following selections is not one of the features provided by a typical MDM?

A)Rapidly deploy new mobile devices
B)Discover devices accessing enterprise systems
C)Track stolen devices
D)Enforce encryption settings
سؤال
How could an administrator initially manage applications on mobile devices using a technique called "app wrapping?"

A)Mobile Application Management
B)Extended Application Management
C)Remote Application Management
D)Cloud Application Management
سؤال
As a class,tablets are devices that closely resemble standard desktop computers.
سؤال
Some mobile devices can be configured so that the device automatically unlocks and stays unlocked until a specific action occurs.
سؤال
An embedded system is computer hardware and software contained within a smaller system that is designed for a specific function.
سؤال
Mobile devices with global positioning system (GPS)abilities typically make use of:

A)weak passwords
B)location services
C)open networks
D)anti-virus software
سؤال
Mobile devices using location services are at increased risk of targeted physical attacks.
سؤال
What PIN is considered to be the most commonly used PIN?

A)1234
B)4321
C)0000
D)7777
سؤال
Tethering may allow an unsecured mobile device to infect other tethered mobile devices or the corporate network.
سؤال
Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise?

A)management flexibility
B)increased internal service
C)increased employee performance
D)less oversight
سؤال
What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access?

A)OTG
B)COPE
C)OTA
D)VDI
سؤال
Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media player.

A)tablet
B)notebook
C)netbook
D)web-based
سؤال
What process gives a user access to a file system on a mobile device with full permissions,essentially allowing the user to do anything on the device?

A)mirroring
B)jailbreaking
C)sideloading
D)carrier unlocking
سؤال
How is the coverage area for a cellular telephony network usually divided in a typical city?

A)Hexagon shaped cells.
B)Square square shaped cells.
C)Triangle shaped cells.
D)Circular shaped cells.
سؤال
What portable computing devices,designed for user convenience,have a sensor called an accelerometer that senses vibrations and movements that can determine the orientation of the device?

A)laptops
B)notebooks
C)tablets
D)subnotebook
سؤال
Which option allows a mobile device to be configured so that the device automatically unlocks and stays unlocked until a specific action occurs?

A)selected context authentication
B)context-aware authentication
C)user designated authentication
D)trigger locking
سؤال
Which enterprise deployment model allows users to use their personal mobile devices for business purposes?

A)BYOD
B)COPE
C)VDI
D)CYOD
سؤال
Which of the following is NOT an Android Smart Lock configuration option?

A)Trusted places detection
B)On-body detection
C)User device detection
D)Trusted face
سؤال
What type of update service can Apple users take advantage of to update their operating systems via wireless carriers?

A)OTG
B)COPE
C)OTA
D)VDI
سؤال
Select the item that is not considered to be a basic characteristic of mobile devices.

A)A small form factor.
B)A mobile operating system.
C)A removable media storage.
D)A data synchronization capabilities.
سؤال
What type of technology can add geographical identification data to media such as digital photos taken on a mobile device?

A)GPS locating
B)GeoData tagging
C)GPS marking
D)GPS tagging
سؤال
Which of the following frameworks requires a QR code or PIN on each IoT device for authenticating it to the network,and uses an Elliptic Curve Diffie-Hellman secure key exchange and a Transport Layer Security (TLS)tunnel?

A)P2413 Standard
B)European Union Telecomm Law and Regulations
C)Security 2 (S2)framework
D)Industrial Internet Security Framework (IISF)
سؤال
Select the proprietary wireless network technology that is used primarily by sensors for communicating data.

A)ANT
B)Bluetooth
C)SCD
D)USB
سؤال
What systems control locally or at remote locations by collecting,monitoring,and processing real-time data so that machines can directly control devices such as valves,pumps,and motors without the need for human intervention?

A)SCADA
B)HVAC
C)ICS
D)RTOS
سؤال
Which of the following systems is located in a satellite and regenerates a signal that is sent back to earth at another frequency?

A)repeater
B)cell transmitter
C)RF receiver
D)modulator
سؤال
Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices?

A)BYOD
B)COPE
C)VDI
D)CYOD
سؤال
What mobile operating system below requires all applications to be reviewed and approved before they can be made available in the App store?

A)Android
B)Blackberry OS
C)iOS
D)Symbian
سؤال
What type of software is specifically designed for a SoC in an embedded system?

A)SCADA
B)HVAC
C)ICS
D)RTOS
سؤال
Which of the following can replace using radio frequency (RF)for the communication media?

A)ANT
B)Bluetooth
C)repeaters
D)infrared
سؤال
How might an attacker misuse a QR code?
سؤال
What particular option can be used mobile devices that contain both personal and corporate data?
سؤال
Describe a notebook computer in relation to a laptop computer.
سؤال
What is the Internet of Things (IoT)?
سؤال
What basic steps are included in securing mobile devices?
سؤال
How does BYOD increase employee performance?
سؤال
List at least three things that can be done in order to reduce the risk of theft or loss of a mobile device.
سؤال
Describe some of the risks associated with using mobile devices in an enterprise environment.
سؤال
Describe how content management is used.
سؤال
What is the difference between a feature phone and a smartphone?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Mobile and Embedded Device Security
1
Select the option that represents a wearable technology.

A)Android
B)iPhone
C)Google Chromebook
D)Google Glass
D
2
Infrared light is next to the visible light on the light spectrum.
True
3
MDM tools cannot provide the ability to detect and restrict jailbroken and rooted devices.
False
4
A QR code can't contain which of the following items directly?

A)A URL.
B)A phone number.
C)An e-mail address.
D)A video.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which management system is used to support the creation and subsequent editing and modification of digital content by multiple employees?

A)extended management
B)content management
C)remote management
D)application management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What type of management system below can help distribute and manage public and corporate apps?

A)Wireless Device Management
B)Mobile Device Management
C)Total Device Management
D)Extended Device Management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
What can be enabled to prevent a mobile device from being used until a user enters the correct passcode,such as a pin or password?

A)Enable a smart card
B)Enable a lock screen
C)Enable a sleep time setting
D)Enable a challenge-response screen
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
The transmission time needed to repeat a signal from one earth station to another is approximately 250 milliseconds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Virtual machines store sensitive applications and data on a remote server that is accessed through a smartphone.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
The greatest asset of a mobile device-its security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer?

A)subnotebook
B)laptop
C)tablet
D)netbook
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following selections is not one of the features provided by a typical MDM?

A)Rapidly deploy new mobile devices
B)Discover devices accessing enterprise systems
C)Track stolen devices
D)Enforce encryption settings
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
How could an administrator initially manage applications on mobile devices using a technique called "app wrapping?"

A)Mobile Application Management
B)Extended Application Management
C)Remote Application Management
D)Cloud Application Management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
As a class,tablets are devices that closely resemble standard desktop computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Some mobile devices can be configured so that the device automatically unlocks and stays unlocked until a specific action occurs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
An embedded system is computer hardware and software contained within a smaller system that is designed for a specific function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Mobile devices with global positioning system (GPS)abilities typically make use of:

A)weak passwords
B)location services
C)open networks
D)anti-virus software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Mobile devices using location services are at increased risk of targeted physical attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
What PIN is considered to be the most commonly used PIN?

A)1234
B)4321
C)0000
D)7777
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Tethering may allow an unsecured mobile device to infect other tethered mobile devices or the corporate network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise?

A)management flexibility
B)increased internal service
C)increased employee performance
D)less oversight
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access?

A)OTG
B)COPE
C)OTA
D)VDI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media player.

A)tablet
B)notebook
C)netbook
D)web-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
What process gives a user access to a file system on a mobile device with full permissions,essentially allowing the user to do anything on the device?

A)mirroring
B)jailbreaking
C)sideloading
D)carrier unlocking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
How is the coverage area for a cellular telephony network usually divided in a typical city?

A)Hexagon shaped cells.
B)Square square shaped cells.
C)Triangle shaped cells.
D)Circular shaped cells.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
What portable computing devices,designed for user convenience,have a sensor called an accelerometer that senses vibrations and movements that can determine the orientation of the device?

A)laptops
B)notebooks
C)tablets
D)subnotebook
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which option allows a mobile device to be configured so that the device automatically unlocks and stays unlocked until a specific action occurs?

A)selected context authentication
B)context-aware authentication
C)user designated authentication
D)trigger locking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which enterprise deployment model allows users to use their personal mobile devices for business purposes?

A)BYOD
B)COPE
C)VDI
D)CYOD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following is NOT an Android Smart Lock configuration option?

A)Trusted places detection
B)On-body detection
C)User device detection
D)Trusted face
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
What type of update service can Apple users take advantage of to update their operating systems via wireless carriers?

A)OTG
B)COPE
C)OTA
D)VDI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Select the item that is not considered to be a basic characteristic of mobile devices.

A)A small form factor.
B)A mobile operating system.
C)A removable media storage.
D)A data synchronization capabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What type of technology can add geographical identification data to media such as digital photos taken on a mobile device?

A)GPS locating
B)GeoData tagging
C)GPS marking
D)GPS tagging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following frameworks requires a QR code or PIN on each IoT device for authenticating it to the network,and uses an Elliptic Curve Diffie-Hellman secure key exchange and a Transport Layer Security (TLS)tunnel?

A)P2413 Standard
B)European Union Telecomm Law and Regulations
C)Security 2 (S2)framework
D)Industrial Internet Security Framework (IISF)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Select the proprietary wireless network technology that is used primarily by sensors for communicating data.

A)ANT
B)Bluetooth
C)SCD
D)USB
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
What systems control locally or at remote locations by collecting,monitoring,and processing real-time data so that machines can directly control devices such as valves,pumps,and motors without the need for human intervention?

A)SCADA
B)HVAC
C)ICS
D)RTOS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following systems is located in a satellite and regenerates a signal that is sent back to earth at another frequency?

A)repeater
B)cell transmitter
C)RF receiver
D)modulator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices?

A)BYOD
B)COPE
C)VDI
D)CYOD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
What mobile operating system below requires all applications to be reviewed and approved before they can be made available in the App store?

A)Android
B)Blackberry OS
C)iOS
D)Symbian
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
What type of software is specifically designed for a SoC in an embedded system?

A)SCADA
B)HVAC
C)ICS
D)RTOS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following can replace using radio frequency (RF)for the communication media?

A)ANT
B)Bluetooth
C)repeaters
D)infrared
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
How might an attacker misuse a QR code?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What particular option can be used mobile devices that contain both personal and corporate data?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe a notebook computer in relation to a laptop computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What is the Internet of Things (IoT)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What basic steps are included in securing mobile devices?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
How does BYOD increase employee performance?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
List at least three things that can be done in order to reduce the risk of theft or loss of a mobile device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Describe some of the risks associated with using mobile devices in an enterprise environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Describe how content management is used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What is the difference between a feature phone and a smartphone?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.