Chapter 10 Quiz

Nov 9th, 2023
4.7 (114 reviews)
24 test answers
question
The transmission time needed to repeat a signal from one earth station to another is approximately 250 milliseconds.
answer
True
question
Infrared light is next to the visible light on the light spectrum.
answer
True
question
Virtual machines store sensitive applications and data on a remote server that is accessed through a smartphone.
answer
False
question
The greatest asset of a mobile device-its security.
answer
False
question
Tethering may allow an unsecured mobile device to infect other tethered mobile devices or the corporate network.
answer
True
question
Some mobile devices can be configured so that the device automatically unlocks and stays unlocked until a specific action occurs.
answer
True
question
An embedded system is computer hardware and software contained within a smaller system that is designed for a specific function.
answer
False
question
A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer?
answer
subnotebook
question
Mobile devices with global positioning system (GPS) abilities typically make use of:
answer
location services
question
What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?
answer
Enable a lock screen
question
What type of management system below can help distribute and manage public and corporate apps on mobile devices?
answer
Mobile device management
question
What PIN is considered to be the most commonly used PIN?
answer
1234
question
A QR code can't contain which of the following items directly?
answer
A video
question
Select the item that is not considered to be a basic characteristic of mobile devices.
answer
A removable media storage
question
What portable computing devices, designed for user convenience, typically have a sensor called an accelerometer that senses vibrations and movements that can determine the orientation of the device?
answer
Tablets
question
Which of the following systems is located in a satellite and regenerates a signal that is sent back to earth at another frequency?
answer
repeater
question
Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices?
answer
COPE
question
Which enterprise deployment model allows users to use their personal mobile devices for business purposes?
answer
BYOD
question
What type of update service can Apple users take advantage of to update their operating systems via wireless carriers?
answer
OTA
question
What type of technology can add geographical identification data to media such as digital photos taken on a mobile device?
answer
GPS tagging
question
What process gives a user access to a file system on a mobile device with full permissions, essentially allowing the user to do anything on the device?
answer
jailbreaking
question
Which option allows a mobile device to be configured so that the device automatically unlocks and stays unlocked until a specific action occurs?
answer
context-aware authentication
question
Which of the following frameworks requires a QR code or PIN on each IoT device for authenticating it to the network, and uses an Elliptic Curve Diffie-Hellman secure key exchange and a Transport Layer Security (TLS) tunnel?
answer
Security 2 (S2) framework
question
What systems control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control devices such as valves, pumps, and motors without the need for human intervention?
answer
ICS
1 of 24
question
The transmission time needed to repeat a signal from one earth station to another is approximately 250 milliseconds.
answer
True
question
Infrared light is next to the visible light on the light spectrum.
answer
True
question
Virtual machines store sensitive applications and data on a remote server that is accessed through a smartphone.
answer
False
question
The greatest asset of a mobile device-its security.
answer
False
question
Tethering may allow an unsecured mobile device to infect other tethered mobile devices or the corporate network.
answer
True
question
Some mobile devices can be configured so that the device automatically unlocks and stays unlocked until a specific action occurs.
answer
True
question
An embedded system is computer hardware and software contained within a smaller system that is designed for a specific function.
answer
False
question
A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer?
answer
subnotebook
question
Mobile devices with global positioning system (GPS) abilities typically make use of:
answer
location services
question
What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?
answer
Enable a lock screen
question
What type of management system below can help distribute and manage public and corporate apps on mobile devices?
answer
Mobile device management
question
What PIN is considered to be the most commonly used PIN?
answer
1234
question
A QR code can't contain which of the following items directly?
answer
A video
question
Select the item that is not considered to be a basic characteristic of mobile devices.
answer
A removable media storage
question
What portable computing devices, designed for user convenience, typically have a sensor called an accelerometer that senses vibrations and movements that can determine the orientation of the device?
answer
Tablets
question
Which of the following systems is located in a satellite and regenerates a signal that is sent back to earth at another frequency?
answer
repeater
question
Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices?
answer
COPE
question
Which enterprise deployment model allows users to use their personal mobile devices for business purposes?
answer
BYOD
question
What type of update service can Apple users take advantage of to update their operating systems via wireless carriers?
answer
OTA
question
What type of technology can add geographical identification data to media such as digital photos taken on a mobile device?
answer
GPS tagging
question
What process gives a user access to a file system on a mobile device with full permissions, essentially allowing the user to do anything on the device?
answer
jailbreaking
question
Which option allows a mobile device to be configured so that the device automatically unlocks and stays unlocked until a specific action occurs?
answer
context-aware authentication
question
Which of the following frameworks requires a QR code or PIN on each IoT device for authenticating it to the network, and uses an Elliptic Curve Diffie-Hellman secure key exchange and a Transport Layer Security (TLS) tunnel?
answer
Security 2 (S2) framework
question
What systems control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control devices such as valves, pumps, and motors without the need for human intervention?
answer
ICS