logo image

Chapter 10 – Mobile Device Security

Select below the option that represents a wearable technology:?

?Android
?iPhone
?Google Chromebook
?Google Glass

?Google Glass
What PC Card type is typically used for memory??

?Type II
?Type IV
?Type III
?Type I

?Type I
?Select below the option that is not one of the SD format card families:

?High capacity (SDHC)
?Standard capacity (SDSC)
?Extreme Capacity (SDXC)
?Secure Digital Input Output (SDIO)

?Extreme Capacity (SDXC)
What SD card family can be used to transmit pictures over a wireless network to a laptop hard drive or wireless printer??

?Standard Capacity (SDSC)
?High Capacity (SDHC)
?Secure Digital Input Output (SDIO)
?eXtended-Capacity (SDXC)

Secure Digital Input Output (SDIO)
?An ultrabook is an example of what type of a portable computer?

?Subnotebook
?Laptop
?Tablet
?Netbook

?Subnotebook
Mobile devices with global positioning system (GPS) abilities typically make use of:?

?Weak passwords
?Location services
?Open networks
?Anti-virus software

?Location services
?What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?

?Enable a smart card
?Enable a lock screen
?Enable a sleep time setting
?Enable a challenge-response screen

?Enable a lock screen
What type of management system below can help facilitate asset tracking?

?Wireless Device Management (WDM)
?Mobile Device Management (MDM)
?Total Device Management (TDM)
?Extended Device Management (EDM)

?Mobile Device Management (MDM)
?How can an administrator manage applications on mobile devices using a technique called “app wrapping?”

?Mobile Application Management
?Extended Application Management
?Remote Application Management
?Cloud Application Management

?Mobile Application Management
?Mobile Device Management systems that allow users to store usernames and passwords within a device are said to be using:

?App wrapping
?Password containers
?Credential management
?Identity control

?Credential management
?What PIN is considered to be the most commonly used PIN?

?1234
?4321
?0000
?7777

1234
?Which of the following selections is not one of the features provided by a typical MDM?

?Rapidly deploy new mobile devices
?Discover devices accessing enterprise systems
?Track stolen devices
?Erase stolen devices

?Track stolen devices
?What term is used to describe the operation of stockrooms where mobile devices are stored prior to their dispersal to employees?

?Asset tracking
?Inventory control
?Device monitoring
?Access filtering

?Inventory control
A QR code can’t contain which of the following items directly?

?A URL
?A phone number
?An e-mail address
?A video

?A video
?What mobile operating system below requires all applications to be reviewed and approved before they can be made available on the public store front?

Android?
?Blackberry OS
?iOS
?Symbian

iOS
?Select below the item that is not considered to be a basic characteristic of mobile devices:

?Small form factor
?Mobile operating system
?Removable media storage
?Data synchronization capabilities

?Removable media storage
?A laptop may have multiple hardware ports. Which of the following is not a typical port included on a laptop?

?Universal Serial Bus (USB)
?eSATA
?RJ-45
?RS232

?RS232
?Select below the type of computing device that uses a limited version of the Linux operating system and uses a web browser with an integrated media player:

Tablet?
?Notebook
?Netbook
?Web-based

?Web-based
?What term below describes a hand-held mobile device that was intended to replace paper systems, and typically included an appointment calendar, an address book, a “to-do” list, a calculator, and the ability to record limited notes?

?Notebook
?Netbook
?Web-based
?Personal digital assistant (PDA)

?Personal digital assistant (PDA)
The PC Card and CardBus devices are being replaced by what technology?

?PCMCIA
?USB
?ExpressCard
?Firewire

ExpressCard

Need essay sample on "Chapter 10 – Mobile Device Security"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy