Security+ Cengage Module6: Mobile and Embedded Device Security

Security+ Cengage Module6: Mobile and Embedded Device Security

Professional Development

20 Qs

quiz-placeholder

Similar activities

Azure Review

Azure Review

Professional Development

20 Qs

WEB KNOWLEDGE 22

WEB KNOWLEDGE 22

University - Professional Development

16 Qs

Teens and Driving

Teens and Driving

8th Grade - Professional Development

15 Qs

G Suite Apps Learning Check

G Suite Apps Learning Check

Professional Development

15 Qs

Premium Subscriptions

Premium Subscriptions

Professional Development

21 Qs

Distancing

Distancing

Professional Development

15 Qs

4IR workshop - APE&OE

4IR workshop - APE&OE

Professional Development

15 Qs

Distribution

Distribution

10th Grade - Professional Development

20 Qs

Security+ Cengage Module6: Mobile and Embedded Device Security

Security+ Cengage Module6: Mobile and Embedded Device Security

Assessment

Quiz

Instructional Technology

Professional Development

Hard

Created by

Alejandro Hidalgo

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ahmet is explaining to his team members the security constraints that have made it a challenge to protect a new embedded system. Which of the following would Akira NOT include as a constraint?

Authentication

Cost

Power

Ease of use

Answer explanation

Ease of recovery, not ease of use, is a constraint in which a compromised sensor may have difficulty recovering to its normal state following an attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Yusuf has been asked to experiment with different hardware to create a controller for a new device on the factory floor. He needs a credit-card sized motherboard that has a microcontroller instead of a microprocessor. Which would be the best solution?

SoC

Raspberry Pi

Arduino

FPGA

Answer explanation

Arduino is designed as a controller for other devices instead of as a complete computer.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Musa needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution?

UEM

MDM

MCCM

MMAM

Answer explanation

All of the capabilities in MDM, MAM, and MCM can be supported by unified endpoint management (UEM).

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In a job interview, Deniz asks about the company policy regarding smartphones. He is told that employees may choose from a limited list of approved devices but that he must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?

BYOD

DYOD

CYOD

Corporate-owned

Answer explanation

In a choose your own device (CYOD) model, employees may choose from a limited list of approved devices but they must pay for the device themselves; however, the company will provide them with a monthly stipend

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Eren has been asked to provide information regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Eren NOT list in their report as a factor in the frequency of Android firmware OTA updates?

OEMs are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates

Because many of the OEMs have modified Android, they are reluctant to distribute updates that could potentially conflict with their changes

Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks

Because OEMs want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely

Answer explanation

Bandwidth usage is not a consideration with OTA updates

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of identifying the geographical location of a mobile device?

Geotracking

Geolocation

GeoID

Geomonitoring

Answer explanation

Geolocation is the process of identifying the geographical location of the device

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an advantage of COPE for an enterprise?

Simplified IT infrastructure

Cost savings

Flexibility in management

More oversight

Answer explanation

Less oversight is an advantage, not more oversight, because businesses do not need to monitor employee telecommunications usage for overages or extra charges

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?