Ovido
Idioma
  • Inglês
  • Espanhol
  • Francês
  • Português
  • Alemão
  • Italiano
  • Holandês
  • Sueco
Texto
  • Maiúsculas

Usuário

  • Entrar
  • Criar conta
  • Atualizar para Premium
Ovido
  • Início
  • Entrar
  • Criar conta

cyber security 10

Agape was asked to make a recommendation regarding short-range
wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she

NOT consider due to its slow speed and its low

deployment levels today?

Infrared

Which type of OS is typically found on an embedded system?

RTOS

A friend of Ukrit told him that he has just downloaded and installed an app that allows him to circumvent the built-in limitations on his
Apple iOS smartphone. What is this called?

Jailbreaking

Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo's opinion regarding its security. What would Paavo tell him about USB OTG security?

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

What allows a device to be managed remotely?

Mobile device management (MDM)

Which technology is NOT a core feature of a mobile device?

Physical keyboard

Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regarding a serious malware incident.
What technology will she use?

Push notification services

Which tool manages the distribution and control of apps?

MAM

Which of the following technologies provides for pictures, video, or audio to be included in text messages?

MMS

Which of these is considered
the strongest type of

passcode to use on a mobile device?

Password

Which of these is NOT a risk of connecting a mobile device to a public network?

Public networks are faster than local networks and can spread malware more quickly to mobile devices.

Calista is designing the specifications for new laptop computers to be purchased by her company. She is comparing the different types and sizes of USB connections found on the devices. Which type USB connection would she NOT find on a laptop?

Type D

What does containerization do?

It separates personal data from corporate data.

What is the process of identifying the geographical location of a mobile device?

Geolocation

Gaetan has attempted to
enter the passcode for his

mobile device but keeps

entering the wrong code.

Now he is asked to enter a

special phrase to continue.

Which configuration setting

is enabled on Gaetan's

mobile device?

Reset to factory settings

In her job interview, Xiu asks about the company policy regarding
smartphones. She is told that employees may choose from a limited

list of approved devices but that she must pay for the device herself;

however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?

CYOD

What enforces the location in which an app can function by tracking the location of the mobile device?

Geofencing

Pakpao has been asked to provide research regarding a new company initiative to add Android smartphones to a list of approved devices.
One of the considerations is how frequently the smartphones receive firmware OTA updates.

Which of the following reasons would Pakpao NOT list in his report as a factor in the frequency of Android firmware OTA updates?

Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks.

Which of these is NOT a security feature for locating a lost or stolen mobile device?

last known good configuration'

Which of the following involves deploying a large number of compromised hosts to flood a target system?

DDOS

Which of the following are
zombie armies formed by a

number of innocent hosts set

up to perform malicious

operations?

Botnets

Many botnets were

controlled through using


what protocol?

IRC

DoS attacks are for gaining unauthorized access or control of a system.
(true or false?)

False

Which of the following
MAINLY applies to email that appears to be sent from a legitimate business?

Phishing

An attacker has targeted
Corp.com's employees with

voicemails that attempt to

acquire sensitive information

by masquerading as a

trustworthy entity. Which

type of attack is this?

Vishing

In MDM terms, which choice would most quickly get a device enrolled on a network?

On-boarding

Apps are small and very useful software programs that range from essential to just silly. They are available from device manufacturers, OS providers, and third parties. Which of the app types listed can be side-loaded on an iOS device?

None

This PIN is used by well over 10% of ATM users in a recent survey of banks limiting the codes to 4 digits

1234

Quiz
it management chapter 7
cyber security chapter 9
farmacocinética aplicadaa odonto
biologi prov genetik
Anthro week 10-11
Matemática Financeira
préposition des verbes
Koine Greek Ch. 25 Imperative Mood
English
Noções de Probabilidade e Estatística
vocabulary 1
Anglais
집 🏠🛋️🪑
교실 👩‍🏫📚📝
módulo 1 B
BABY BOOMERS
Fatores bioticos e abioticos
digestão
Biologi
Engels Unit 3 Vocabulairy 3.1 t/m 3.4 + Phrases - copy
Spaans: Zomervakantie
attack on the queen
vicab
ss
Hur Sverige styrs
Ethics
GSS35L
Osteoporose
gs
hl bio test pt. 2
communicazione interculturale UD 2
bio hl test -- dna
L2 S2 : Relations internationales
history
hp morfem + suffix
Biologia 5
Teste de inglês
Comportamento do consumidor
Laís
Teste de história
help
SRA Principles
indicateurs de temps
féminin ou masculin
Discours direct et indirect
Hypothèses
redes urbanas
définition stss
english
Modalities Week 9-11 Flashcards