Deck 10: Mobile Device Security

ملء الشاشة (f)
exit full mode
سؤال
What type of management system below can help facilitate asset tracking?

A)​Wireless Device Management (WDM)
B)​Mobile Device Management (MDM)
C)​Extended Device Management (EDM)
D)​Total Device Management (TDM)
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The PC Card and CardBus devices are being replaced by what technology?

A)​PCMCIA
B)​USB
C)​ExpressCard
D)​Firewire
سؤال
Mobile devices such as laptops are stolen on average once every 20 seconds.​
سؤال
Simply using a mobile device in a public area can be considered a risk.
سؤال
What SD card family can be used to transmit pictures over a wireless network to a laptop hard drive or wireless printer?​

A)​Standard Capacity (SDSC)
B)​High Capacity (SDHC)
C)​eXtended-Capacity (SDXC)
D)​Secure Digital Input Output (SDIO)
سؤال
​What term is used to describe the operation of stockrooms where mobile devices are stored prior to their dispersal to employees?

A)​Asset tracking
B)​Inventory control
C)​Device monitoring
D)​Access filtering
سؤال
​A laptop may have multiple hardware ports. Which of the following is not a typical port included on a laptop?

A)​Universal Serial Bus (USB)
B)​eSATA
C)​RJ-45
D)​RS232
سؤال
The CardBus is a 64-bit bus in the PC card form factor.
سؤال
​What term below describes a hand-held mobile device that was intended to replace paper systems, and typically included an appointment calendar, an address book, a "to-do" list, a calculator, and the ability to record limited notes?

A)​Notebook
B)​Netbook
C)​Web-based
D)​Personal digital assistant (PDA)
سؤال
​An ultrabook is an example of what type of a portable computer?

A)​Laptop
B)​Netbook
C)​Subnotebook
D)​Tablet
سؤال
A QR code can store website URLs, plain text, phone numbers, e-mail addresses, or virtually any alphanumeric data up to 4296 characters.​
سؤال
The Google Android mobile operating system is a proprietary system, for use on only approved devices.​
سؤال
Mobile devices with global positioning system (GPS) abilities typically make use of:​

A)​Anti-virus software
B)​Location services
C)​Open networks
D)​Weak passwords
سؤال
​Select below the item that is not considered to be a basic characteristic of mobile devices:

A)​Small form factor
B)​Mobile operating system
C)​Removable media storage
D)​Data synchronization capabilities
سؤال
​What PIN is considered to be the most commonly used PIN?

A)​1234
B)​4321
C)​0000
D)​7777
سؤال
​Select below the type of computing device that uses a limited version of the Linux operating system and uses a web browser with an integrated media player:

A)Tablet​
B)​Notebook
C)​Netbook
D)​Web-based
سؤال
​What mobile operating system below requires all applications to be reviewed and approved before they can be made available on the public store front?

A)Android​
B)​Blackberry OS
C)​iOS
D)​Symbian
سؤال
Select below the option that represents a wearable technology:​

A)​iPhone
B)​Android
C)​Google Glass
D)​Google Chromebook
سؤال
​Mobile Device Management systems that allow users to store usernames and passwords within a device are said to be using:

A)​App wrapping
B)​Password containers
C)​Credential management
D)​Identity control
سؤال
A QR code can't contain which of the following items directly?

A)​A URL
B)​A phone number
C)​An e-mail address
D)​A video
سؤال
​What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?

A)​Enable a lock screen
B)​Enable a sleep time setting
C)​Enable a challenge-response screen
D)​Enable a smart card
سؤال
​Which of the following selections is not one of the features provided by a typical MDM?

A)​Rapidly deploy new mobile devices
B)​Discover devices accessing enterprise systems
C)​Track stolen devices
D)​Erase stolen devices
سؤال
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
​Maintaining an accurate record of company-owned mobile devices
سؤال
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to rapidly enroll new mobile devices.​
سؤال
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to remote erase sensitive data stored on a mobile device​
سؤال
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Using a mobile device's GPS to define geographical boundaries where an app can be used.​
سؤال
The Apple _____________ operating system, developed by Apple for their mobile devices, is a closed and proprietary architecture.
سؤال
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Adding or allowing geographical identification data in a mobile app​
سؤال
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
A technology that prevents a mobile device from being used until the user enters the correct passcode.​
سؤال
​Select below the option that is not one of the SD format card families:

A)​Standard capacity (SDSC)
B)​High capacity (SDHC)
C)​Extreme Capacity (SDXC)
D)​Secure Digital Input Output (SDIO)
سؤال
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to quickly remove devices from the organization's network​
سؤال
What PC Card type is typically used for memory?​

A)​Type I
B)​Type II
C)​Type III
D)​Type IV
سؤال
​How can an administrator manage applications on mobile devices using a technique called "app wrapping?"

A)​Mobile Application Management
B)​Extended Application Management
C)​Remote Application Management
D)​Cloud Application Management
سؤال
A _____________ is a matrix or two-dimensional barcode first designed for the automotive industry in Japan.​
سؤال
_________________ uses a device's GPS to define geographical boundaries where an app can be used.​
سؤال
_____________ are portable computing devices that are generally larger than smartphones and smaller than notebooks, and are focused on ease of use.​
سؤال
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Services that can identify the location of a person carrying a mobile device or a specific store or restaurant.​
سؤال
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
​A small form factor storage media of a variety of different types and sizes.
سؤال
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The tools and services responsible for distributing and controlling access to apps.​
سؤال
Mobile devices use _____________ for storage, which is a nonvolatile solid state electronic storage that can be electrically erased and reused.​
سؤال
What are the two options for using encryption with mobile devices?​
سؤال
​How might an attacker misuse a QR code?
سؤال
​Describe a netbook computer.
سؤال
How does BYOD increase employee performance?
سؤال
List at least three things that can be done in order to reduce the risk of theft or loss of a mobile device.
سؤال
​How can encryption be used on Apple iOS and Google Android mobile operating systems?
سؤال
Describe a subnotebook computer.
سؤال
What are the three sizes of SD cards available, and how are they typically used?​
سؤال
​What is the difference between a feature phone and a smartphone?
سؤال
Describe some of the risks associated with BYOD.​
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Mobile Device Security
1
What type of management system below can help facilitate asset tracking?

A)​Wireless Device Management (WDM)
B)​Mobile Device Management (MDM)
C)​Extended Device Management (EDM)
D)​Total Device Management (TDM)
B
2
The PC Card and CardBus devices are being replaced by what technology?

A)​PCMCIA
B)​USB
C)​ExpressCard
D)​Firewire
C
3
Mobile devices such as laptops are stolen on average once every 20 seconds.​
False
4
Simply using a mobile device in a public area can be considered a risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
What SD card family can be used to transmit pictures over a wireless network to a laptop hard drive or wireless printer?​

A)​Standard Capacity (SDSC)
B)​High Capacity (SDHC)
C)​eXtended-Capacity (SDXC)
D)​Secure Digital Input Output (SDIO)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
​What term is used to describe the operation of stockrooms where mobile devices are stored prior to their dispersal to employees?

A)​Asset tracking
B)​Inventory control
C)​Device monitoring
D)​Access filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
​A laptop may have multiple hardware ports. Which of the following is not a typical port included on a laptop?

A)​Universal Serial Bus (USB)
B)​eSATA
C)​RJ-45
D)​RS232
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
The CardBus is a 64-bit bus in the PC card form factor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
​What term below describes a hand-held mobile device that was intended to replace paper systems, and typically included an appointment calendar, an address book, a "to-do" list, a calculator, and the ability to record limited notes?

A)​Notebook
B)​Netbook
C)​Web-based
D)​Personal digital assistant (PDA)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
​An ultrabook is an example of what type of a portable computer?

A)​Laptop
B)​Netbook
C)​Subnotebook
D)​Tablet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
A QR code can store website URLs, plain text, phone numbers, e-mail addresses, or virtually any alphanumeric data up to 4296 characters.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
The Google Android mobile operating system is a proprietary system, for use on only approved devices.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Mobile devices with global positioning system (GPS) abilities typically make use of:​

A)​Anti-virus software
B)​Location services
C)​Open networks
D)​Weak passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
​Select below the item that is not considered to be a basic characteristic of mobile devices:

A)​Small form factor
B)​Mobile operating system
C)​Removable media storage
D)​Data synchronization capabilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
​What PIN is considered to be the most commonly used PIN?

A)​1234
B)​4321
C)​0000
D)​7777
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
​Select below the type of computing device that uses a limited version of the Linux operating system and uses a web browser with an integrated media player:

A)Tablet​
B)​Notebook
C)​Netbook
D)​Web-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
​What mobile operating system below requires all applications to be reviewed and approved before they can be made available on the public store front?

A)Android​
B)​Blackberry OS
C)​iOS
D)​Symbian
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Select below the option that represents a wearable technology:​

A)​iPhone
B)​Android
C)​Google Glass
D)​Google Chromebook
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
​Mobile Device Management systems that allow users to store usernames and passwords within a device are said to be using:

A)​App wrapping
B)​Password containers
C)​Credential management
D)​Identity control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
A QR code can't contain which of the following items directly?

A)​A URL
B)​A phone number
C)​An e-mail address
D)​A video
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
​What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?

A)​Enable a lock screen
B)​Enable a sleep time setting
C)​Enable a challenge-response screen
D)​Enable a smart card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
​Which of the following selections is not one of the features provided by a typical MDM?

A)​Rapidly deploy new mobile devices
B)​Discover devices accessing enterprise systems
C)​Track stolen devices
D)​Erase stolen devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
​Maintaining an accurate record of company-owned mobile devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to rapidly enroll new mobile devices.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to remote erase sensitive data stored on a mobile device​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Using a mobile device's GPS to define geographical boundaries where an app can be used.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
The Apple _____________ operating system, developed by Apple for their mobile devices, is a closed and proprietary architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Adding or allowing geographical identification data in a mobile app​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
A technology that prevents a mobile device from being used until the user enters the correct passcode.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
​Select below the option that is not one of the SD format card families:

A)​Standard capacity (SDSC)
B)​High capacity (SDHC)
C)​Extreme Capacity (SDXC)
D)​Secure Digital Input Output (SDIO)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to quickly remove devices from the organization's network​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What PC Card type is typically used for memory?​

A)​Type I
B)​Type II
C)​Type III
D)​Type IV
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
​How can an administrator manage applications on mobile devices using a technique called "app wrapping?"

A)​Mobile Application Management
B)​Extended Application Management
C)​Remote Application Management
D)​Cloud Application Management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
A _____________ is a matrix or two-dimensional barcode first designed for the automotive industry in Japan.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
_________________ uses a device's GPS to define geographical boundaries where an app can be used.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
_____________ are portable computing devices that are generally larger than smartphones and smaller than notebooks, and are focused on ease of use.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Services that can identify the location of a person carrying a mobile device or a specific store or restaurant.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
​A small form factor storage media of a variety of different types and sizes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The tools and services responsible for distributing and controlling access to apps.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Mobile devices use _____________ for storage, which is a nonvolatile solid state electronic storage that can be electrically erased and reused.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the two options for using encryption with mobile devices?​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
​How might an attacker misuse a QR code?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
​Describe a netbook computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
How does BYOD increase employee performance?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
List at least three things that can be done in order to reduce the risk of theft or loss of a mobile device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
​How can encryption be used on Apple iOS and Google Android mobile operating systems?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Describe a subnotebook computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What are the three sizes of SD cards available, and how are they typically used?​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
​What is the difference between a feature phone and a smartphone?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Describe some of the risks associated with BYOD.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.