Deck 10: Mobile Device Security

Full screen (f)
exit full mode
Question
What type of management system below can help facilitate asset tracking?

A)​Wireless Device Management (WDM)
B)​Mobile Device Management (MDM)
C)​Extended Device Management (EDM)
D)​Total Device Management (TDM)
Use Space or
up arrow
down arrow
to flip the card.
Question
The PC Card and CardBus devices are being replaced by what technology?

A)​PCMCIA
B)​USB
C)​ExpressCard
D)​Firewire
Question
Mobile devices such as laptops are stolen on average once every 20 seconds.​
Question
Simply using a mobile device in a public area can be considered a risk.
Question
What SD card family can be used to transmit pictures over a wireless network to a laptop hard drive or wireless printer?​

A)​Standard Capacity (SDSC)
B)​High Capacity (SDHC)
C)​eXtended-Capacity (SDXC)
D)​Secure Digital Input Output (SDIO)
Question
​What term is used to describe the operation of stockrooms where mobile devices are stored prior to their dispersal to employees?

A)​Asset tracking
B)​Inventory control
C)​Device monitoring
D)​Access filtering
Question
​A laptop may have multiple hardware ports. Which of the following is not a typical port included on a laptop?

A)​Universal Serial Bus (USB)
B)​eSATA
C)​RJ-45
D)​RS232
Question
The CardBus is a 64-bit bus in the PC card form factor.
Question
​What term below describes a hand-held mobile device that was intended to replace paper systems, and typically included an appointment calendar, an address book, a "to-do" list, a calculator, and the ability to record limited notes?

A)​Notebook
B)​Netbook
C)​Web-based
D)​Personal digital assistant (PDA)
Question
​An ultrabook is an example of what type of a portable computer?

A)​Laptop
B)​Netbook
C)​Subnotebook
D)​Tablet
Question
A QR code can store website URLs, plain text, phone numbers, e-mail addresses, or virtually any alphanumeric data up to 4296 characters.​
Question
The Google Android mobile operating system is a proprietary system, for use on only approved devices.​
Question
Mobile devices with global positioning system (GPS) abilities typically make use of:​

A)​Anti-virus software
B)​Location services
C)​Open networks
D)​Weak passwords
Question
​Select below the item that is not considered to be a basic characteristic of mobile devices:

A)​Small form factor
B)​Mobile operating system
C)​Removable media storage
D)​Data synchronization capabilities
Question
​What PIN is considered to be the most commonly used PIN?

A)​1234
B)​4321
C)​0000
D)​7777
Question
​Select below the type of computing device that uses a limited version of the Linux operating system and uses a web browser with an integrated media player:

A)Tablet​
B)​Notebook
C)​Netbook
D)​Web-based
Question
​What mobile operating system below requires all applications to be reviewed and approved before they can be made available on the public store front?

A)Android​
B)​Blackberry OS
C)​iOS
D)​Symbian
Question
Select below the option that represents a wearable technology:​

A)​iPhone
B)​Android
C)​Google Glass
D)​Google Chromebook
Question
​Mobile Device Management systems that allow users to store usernames and passwords within a device are said to be using:

A)​App wrapping
B)​Password containers
C)​Credential management
D)​Identity control
Question
A QR code can't contain which of the following items directly?

A)​A URL
B)​A phone number
C)​An e-mail address
D)​A video
Question
​What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?

A)​Enable a lock screen
B)​Enable a sleep time setting
C)​Enable a challenge-response screen
D)​Enable a smart card
Question
​Which of the following selections is not one of the features provided by a typical MDM?

A)​Rapidly deploy new mobile devices
B)​Discover devices accessing enterprise systems
C)​Track stolen devices
D)​Erase stolen devices
Question
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
​Maintaining an accurate record of company-owned mobile devices
Question
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to rapidly enroll new mobile devices.​
Question
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to remote erase sensitive data stored on a mobile device​
Question
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Using a mobile device's GPS to define geographical boundaries where an app can be used.​
Question
The Apple _____________ operating system, developed by Apple for their mobile devices, is a closed and proprietary architecture.
Question
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Adding or allowing geographical identification data in a mobile app​
Question
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
A technology that prevents a mobile device from being used until the user enters the correct passcode.​
Question
​Select below the option that is not one of the SD format card families:

A)​Standard capacity (SDSC)
B)​High capacity (SDHC)
C)​Extreme Capacity (SDXC)
D)​Secure Digital Input Output (SDIO)
Question
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to quickly remove devices from the organization's network​
Question
What PC Card type is typically used for memory?​

A)​Type I
B)​Type II
C)​Type III
D)​Type IV
Question
​How can an administrator manage applications on mobile devices using a technique called "app wrapping?"

A)​Mobile Application Management
B)​Extended Application Management
C)​Remote Application Management
D)​Cloud Application Management
Question
A _____________ is a matrix or two-dimensional barcode first designed for the automotive industry in Japan.​
Question
_________________ uses a device's GPS to define geographical boundaries where an app can be used.​
Question
_____________ are portable computing devices that are generally larger than smartphones and smaller than notebooks, and are focused on ease of use.​
Question
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Services that can identify the location of a person carrying a mobile device or a specific store or restaurant.​
Question
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
​A small form factor storage media of a variety of different types and sizes.
Question
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The tools and services responsible for distributing and controlling access to apps.​
Question
Mobile devices use _____________ for storage, which is a nonvolatile solid state electronic storage that can be electrically erased and reused.​
Question
What are the two options for using encryption with mobile devices?​
Question
​How might an attacker misuse a QR code?
Question
​Describe a netbook computer.
Question
How does BYOD increase employee performance?
Question
List at least three things that can be done in order to reduce the risk of theft or loss of a mobile device.
Question
​How can encryption be used on Apple iOS and Google Android mobile operating systems?
Question
Describe a subnotebook computer.
Question
What are the three sizes of SD cards available, and how are they typically used?​
Question
​What is the difference between a feature phone and a smartphone?
Question
Describe some of the risks associated with BYOD.​
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Mobile Device Security
1
What type of management system below can help facilitate asset tracking?

A)​Wireless Device Management (WDM)
B)​Mobile Device Management (MDM)
C)​Extended Device Management (EDM)
D)​Total Device Management (TDM)
B
2
The PC Card and CardBus devices are being replaced by what technology?

A)​PCMCIA
B)​USB
C)​ExpressCard
D)​Firewire
C
3
Mobile devices such as laptops are stolen on average once every 20 seconds.​
False
4
Simply using a mobile device in a public area can be considered a risk.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
What SD card family can be used to transmit pictures over a wireless network to a laptop hard drive or wireless printer?​

A)​Standard Capacity (SDSC)
B)​High Capacity (SDHC)
C)​eXtended-Capacity (SDXC)
D)​Secure Digital Input Output (SDIO)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
​What term is used to describe the operation of stockrooms where mobile devices are stored prior to their dispersal to employees?

A)​Asset tracking
B)​Inventory control
C)​Device monitoring
D)​Access filtering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
​A laptop may have multiple hardware ports. Which of the following is not a typical port included on a laptop?

A)​Universal Serial Bus (USB)
B)​eSATA
C)​RJ-45
D)​RS232
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The CardBus is a 64-bit bus in the PC card form factor.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
​What term below describes a hand-held mobile device that was intended to replace paper systems, and typically included an appointment calendar, an address book, a "to-do" list, a calculator, and the ability to record limited notes?

A)​Notebook
B)​Netbook
C)​Web-based
D)​Personal digital assistant (PDA)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
​An ultrabook is an example of what type of a portable computer?

A)​Laptop
B)​Netbook
C)​Subnotebook
D)​Tablet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
A QR code can store website URLs, plain text, phone numbers, e-mail addresses, or virtually any alphanumeric data up to 4296 characters.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The Google Android mobile operating system is a proprietary system, for use on only approved devices.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Mobile devices with global positioning system (GPS) abilities typically make use of:​

A)​Anti-virus software
B)​Location services
C)​Open networks
D)​Weak passwords
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
​Select below the item that is not considered to be a basic characteristic of mobile devices:

A)​Small form factor
B)​Mobile operating system
C)​Removable media storage
D)​Data synchronization capabilities
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
​What PIN is considered to be the most commonly used PIN?

A)​1234
B)​4321
C)​0000
D)​7777
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
​Select below the type of computing device that uses a limited version of the Linux operating system and uses a web browser with an integrated media player:

A)Tablet​
B)​Notebook
C)​Netbook
D)​Web-based
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
​What mobile operating system below requires all applications to be reviewed and approved before they can be made available on the public store front?

A)Android​
B)​Blackberry OS
C)​iOS
D)​Symbian
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Select below the option that represents a wearable technology:​

A)​iPhone
B)​Android
C)​Google Glass
D)​Google Chromebook
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
​Mobile Device Management systems that allow users to store usernames and passwords within a device are said to be using:

A)​App wrapping
B)​Password containers
C)​Credential management
D)​Identity control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A QR code can't contain which of the following items directly?

A)​A URL
B)​A phone number
C)​An e-mail address
D)​A video
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
​What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?

A)​Enable a lock screen
B)​Enable a sleep time setting
C)​Enable a challenge-response screen
D)​Enable a smart card
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
​Which of the following selections is not one of the features provided by a typical MDM?

A)​Rapidly deploy new mobile devices
B)​Discover devices accessing enterprise systems
C)​Track stolen devices
D)​Erase stolen devices
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
​Maintaining an accurate record of company-owned mobile devices
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to rapidly enroll new mobile devices.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to remote erase sensitive data stored on a mobile device​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Using a mobile device's GPS to define geographical boundaries where an app can be used.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
The Apple _____________ operating system, developed by Apple for their mobile devices, is a closed and proprietary architecture.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Adding or allowing geographical identification data in a mobile app​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
A technology that prevents a mobile device from being used until the user enters the correct passcode.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
​Select below the option that is not one of the SD format card families:

A)​Standard capacity (SDSC)
B)​High capacity (SDHC)
C)​Extreme Capacity (SDXC)
D)​Secure Digital Input Output (SDIO)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The ability to quickly remove devices from the organization's network​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What PC Card type is typically used for memory?​

A)​Type I
B)​Type II
C)​Type III
D)​Type IV
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
​How can an administrator manage applications on mobile devices using a technique called "app wrapping?"

A)​Mobile Application Management
B)​Extended Application Management
C)​Remote Application Management
D)​Cloud Application Management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A _____________ is a matrix or two-dimensional barcode first designed for the automotive industry in Japan.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
_________________ uses a device's GPS to define geographical boundaries where an app can be used.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
_____________ are portable computing devices that are generally larger than smartphones and smaller than notebooks, and are focused on ease of use.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
Services that can identify the location of a person carrying a mobile device or a specific store or restaurant.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
​A small form factor storage media of a variety of different types and sizes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Matching
a. Asset tracking
b. Geo-fencing
c. Geo-tagging
d. Location services
e. Lock screen
f. Mobile application management (MAM)
g. Off-boarding
h. On-boarding
i. Remote wiping j. Secure digital (SD)
The tools and services responsible for distributing and controlling access to apps.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Mobile devices use _____________ for storage, which is a nonvolatile solid state electronic storage that can be electrically erased and reused.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What are the two options for using encryption with mobile devices?​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
​How might an attacker misuse a QR code?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
​Describe a netbook computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
How does BYOD increase employee performance?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
List at least three things that can be done in order to reduce the risk of theft or loss of a mobile device.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
​How can encryption be used on Apple iOS and Google Android mobile operating systems?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe a subnotebook computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What are the three sizes of SD cards available, and how are they typically used?​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
​What is the difference between a feature phone and a smartphone?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Describe some of the risks associated with BYOD.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.