Security+ Cengage Module6: Mobile and Embedded Device Security

Security+ Cengage Module6: Mobile and Embedded Device Security

Professional Development

20 Qs

quiz-placeholder

Similar activities

Cyber Security Quiz

Cyber Security Quiz

Professional Development

15 Qs

its the future

its the future

8th Grade - Professional Development

18 Qs

PENGEMBANGAN APLIKASI AI INFORMATIKA XI

PENGEMBANGAN APLIKASI AI INFORMATIKA XI

Professional Development

20 Qs

Google Drive Quiz

Google Drive Quiz

Professional Development

15 Qs

Arquitetura interna de Micros

Arquitetura interna de Micros

Professional Development

15 Qs

RMartinez Canvas PD Ice Breaker 2022-2023 ~ Dr. Thompson

RMartinez Canvas PD Ice Breaker 2022-2023 ~ Dr. Thompson

Professional Development

20 Qs

Ddy Quiz 13 Sept

Ddy Quiz 13 Sept

Professional Development

20 Qs

Quiz: Dale's Cone of Experience

Quiz: Dale's Cone of Experience

Professional Development

20 Qs

Security+ Cengage Module6: Mobile and Embedded Device Security

Security+ Cengage Module6: Mobile and Embedded Device Security

Assessment

Quiz

Instructional Technology

Professional Development

Hard

Created by

Alejandro Hidalgo

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ahmet is explaining to his team members the security constraints that have made it a challenge to protect a new embedded system. Which of the following would Akira NOT include as a constraint?

Authentication

Cost

Power

Ease of use

Answer explanation

Ease of recovery, not ease of use, is a constraint in which a compromised sensor may have difficulty recovering to its normal state following an attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Yusuf has been asked to experiment with different hardware to create a controller for a new device on the factory floor. He needs a credit-card sized motherboard that has a microcontroller instead of a microprocessor. Which would be the best solution?

SoC

Raspberry Pi

Arduino

FPGA

Answer explanation

Arduino is designed as a controller for other devices instead of as a complete computer.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Musa needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution?

UEM

MDM

MCCM

MMAM

Answer explanation

All of the capabilities in MDM, MAM, and MCM can be supported by unified endpoint management (UEM).

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In a job interview, Deniz asks about the company policy regarding smartphones. He is told that employees may choose from a limited list of approved devices but that he must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?

BYOD

DYOD

CYOD

Corporate-owned

Answer explanation

In a choose your own device (CYOD) model, employees may choose from a limited list of approved devices but they must pay for the device themselves; however, the company will provide them with a monthly stipend

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Eren has been asked to provide information regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Eren NOT list in their report as a factor in the frequency of Android firmware OTA updates?

OEMs are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates

Because many of the OEMs have modified Android, they are reluctant to distribute updates that could potentially conflict with their changes

Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks

Because OEMs want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely

Answer explanation

Bandwidth usage is not a consideration with OTA updates

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of identifying the geographical location of a mobile device?

Geotracking

Geolocation

GeoID

Geomonitoring

Answer explanation

Geolocation is the process of identifying the geographical location of the device

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an advantage of COPE for an enterprise?

Simplified IT infrastructure

Cost savings

Flexibility in management

More oversight

Answer explanation

Less oversight is an advantage, not more oversight, because businesses do not need to monitor employee telecommunications usage for overages or extra charges

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?