Deck 10: Mobile Device Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 10: Mobile Device Security
1
What type of management system below can help facilitate asset tracking?
A)Wireless Device Management (WDM)
B)Mobile Device Management (MDM)
C)Extended Device Management (EDM)
D)Total Device Management (TDM)
A)Wireless Device Management (WDM)
B)Mobile Device Management (MDM)
C)Extended Device Management (EDM)
D)Total Device Management (TDM)
B
2
The PC Card and CardBus devices are being replaced by what technology?
A)PCMCIA
B)USB
C)ExpressCard
D)Firewire
A)PCMCIA
B)USB
C)ExpressCard
D)Firewire
C
3
Mobile devices such as laptops are stolen on average once every 20 seconds.
False
4
Simply using a mobile device in a public area can be considered a risk.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
What SD card family can be used to transmit pictures over a wireless network to a laptop hard drive or wireless printer?
A)Standard Capacity (SDSC)
B)High Capacity (SDHC)
C)eXtended-Capacity (SDXC)
D)Secure Digital Input Output (SDIO)
A)Standard Capacity (SDSC)
B)High Capacity (SDHC)
C)eXtended-Capacity (SDXC)
D)Secure Digital Input Output (SDIO)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
What term is used to describe the operation of stockrooms where mobile devices are stored prior to their dispersal to employees?
A)Asset tracking
B)Inventory control
C)Device monitoring
D)Access filtering
A)Asset tracking
B)Inventory control
C)Device monitoring
D)Access filtering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
A laptop may have multiple hardware ports. Which of the following is not a typical port included on a laptop?
A)Universal Serial Bus (USB)
B)eSATA
C)RJ-45
D)RS232
A)Universal Serial Bus (USB)
B)eSATA
C)RJ-45
D)RS232
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The CardBus is a 64-bit bus in the PC card form factor.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What term below describes a hand-held mobile device that was intended to replace paper systems, and typically included an appointment calendar, an address book, a "to-do" list, a calculator, and the ability to record limited notes?
A)Notebook
B)Netbook
C)Web-based
D)Personal digital assistant (PDA)
A)Notebook
B)Netbook
C)Web-based
D)Personal digital assistant (PDA)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
An ultrabook is an example of what type of a portable computer?
A)Laptop
B)Netbook
C)Subnotebook
D)Tablet
A)Laptop
B)Netbook
C)Subnotebook
D)Tablet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
A QR code can store website URLs, plain text, phone numbers, e-mail addresses, or virtually any alphanumeric data up to 4296 characters.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The Google Android mobile operating system is a proprietary system, for use on only approved devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Mobile devices with global positioning system (GPS) abilities typically make use of:
A)Anti-virus software
B)Location services
C)Open networks
D)Weak passwords
A)Anti-virus software
B)Location services
C)Open networks
D)Weak passwords
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Select below the item that is not considered to be a basic characteristic of mobile devices:
A)Small form factor
B)Mobile operating system
C)Removable media storage
D)Data synchronization capabilities
A)Small form factor
B)Mobile operating system
C)Removable media storage
D)Data synchronization capabilities
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
What PIN is considered to be the most commonly used PIN?
A)1234
B)4321
C)0000
D)7777
A)1234
B)4321
C)0000
D)7777
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Select below the type of computing device that uses a limited version of the Linux operating system and uses a web browser with an integrated media player:
A)Tablet
B)Notebook
C)Netbook
D)Web-based
A)Tablet
B)Notebook
C)Netbook
D)Web-based
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
What mobile operating system below requires all applications to be reviewed and approved before they can be made available on the public store front?
A)Android
B)Blackberry OS
C)iOS
D)Symbian
A)Android
B)Blackberry OS
C)iOS
D)Symbian
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Select below the option that represents a wearable technology:
A)iPhone
B)Android
C)Google Glass
D)Google Chromebook
A)iPhone
B)Android
C)Google Glass
D)Google Chromebook
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Mobile Device Management systems that allow users to store usernames and passwords within a device are said to be using:
A)App wrapping
B)Password containers
C)Credential management
D)Identity control
A)App wrapping
B)Password containers
C)Credential management
D)Identity control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A QR code can't contain which of the following items directly?
A)A URL
B)A phone number
C)An e-mail address
D)A video
A)A URL
B)A phone number
C)An e-mail address
D)A video
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?
A)Enable a lock screen
B)Enable a sleep time setting
C)Enable a challenge-response screen
D)Enable a smart card
A)Enable a lock screen
B)Enable a sleep time setting
C)Enable a challenge-response screen
D)Enable a smart card
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following selections is not one of the features provided by a typical MDM?
A)Rapidly deploy new mobile devices
B)Discover devices accessing enterprise systems
C)Track stolen devices
D)Erase stolen devices
A)Rapidly deploy new mobile devices
B)Discover devices accessing enterprise systems
C)Track stolen devices
D)Erase stolen devices
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Maintaining an accurate record of company-owned mobile devices
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Maintaining an accurate record of company-owned mobile devices
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to rapidly enroll new mobile devices.
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to rapidly enroll new mobile devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to remote erase sensitive data stored on a mobile device
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to remote erase sensitive data stored on a mobile device
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Using a mobile device's GPS to define geographical boundaries where an app can be used.
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Using a mobile device's GPS to define geographical boundaries where an app can be used.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
The Apple _____________ operating system, developed by Apple for their mobile devices, is a closed and proprietary architecture.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Adding or allowing geographical identification data in a mobile app
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Adding or allowing geographical identification data in a mobile app
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
A technology that prevents a mobile device from being used until the user enters the correct passcode.
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
A technology that prevents a mobile device from being used until the user enters the correct passcode.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Select below the option that is not one of the SD format card families:
A)Standard capacity (SDSC)
B)High capacity (SDHC)
C)Extreme Capacity (SDXC)
D)Secure Digital Input Output (SDIO)
A)Standard capacity (SDSC)
B)High capacity (SDHC)
C)Extreme Capacity (SDXC)
D)Secure Digital Input Output (SDIO)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to quickly remove devices from the organization's network
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to quickly remove devices from the organization's network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What PC Card type is typically used for memory?
A)Type I
B)Type II
C)Type III
D)Type IV
A)Type I
B)Type II
C)Type III
D)Type IV
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
How can an administrator manage applications on mobile devices using a technique called "app wrapping?"
A)Mobile Application Management
B)Extended Application Management
C)Remote Application Management
D)Cloud Application Management
A)Mobile Application Management
B)Extended Application Management
C)Remote Application Management
D)Cloud Application Management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A _____________ is a matrix or two-dimensional barcode first designed for the automotive industry in Japan.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
_________________ uses a device's GPS to define geographical boundaries where an app can be used.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
_____________ are portable computing devices that are generally larger than smartphones and smaller than notebooks, and are focused on ease of use.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Services that can identify the location of a person carrying a mobile device or a specific store or restaurant.
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Services that can identify the location of a person carrying a mobile device or a specific store or restaurant.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
A small form factor storage media of a variety of different types and sizes.
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
A small form factor storage media of a variety of different types and sizes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The tools and services responsible for distributing and controlling access to apps.
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The tools and services responsible for distributing and controlling access to apps.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Mobile devices use _____________ for storage, which is a nonvolatile solid state electronic storage that can be electrically erased and reused.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What are the two options for using encryption with mobile devices?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
How might an attacker misuse a QR code?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe a netbook computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
How does BYOD increase employee performance?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
List at least three things that can be done in order to reduce the risk of theft or loss of a mobile device.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
How can encryption be used on Apple iOS and Google Android mobile operating systems?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe a subnotebook computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What are the three sizes of SD cards available, and how are they typically used?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is the difference between a feature phone and a smartphone?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Describe some of the risks associated with BYOD.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck