Search Header Logo

Mod 06 Mobile and Embedded Device Security

Authored by willie reynolds

Instructional Technology

Vocational training

Mod 06 Mobile and Embedded Device Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why has there been a heightened interest by threat actors toward attacking mobile devices?

They have limited OTA capabilities.

They have access to sensitive data.

They use wireless technology.

They are easy to steal.

Answer explanation

Threat actors are increasingly targeting mobile devices because they contain sensitive data, such as personal information and financial details, making them lucrative targets for attacks.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A parent, who is a small business owner, takes their child on a business trip. The child uses the parent's phone during the flight. Unfortunately, the child leaves the phone on the plane, but the parent realizes it after it is too late to retrieve it. What kind of security could have prevented this type of vulnerability?

Screen lock

Remote wipe

Physical security

Location tracking

Answer explanation

Physical security could have prevented the child from leaving the phone on the plane by ensuring the device was securely attached or stored, reducing the risk of loss during travel.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small company decides to adopt the COPE enterprise deployment model and supplies Android devices to its employees. Due to a significant downturn in the economy, they have not upgraded the devices in five years. What should the company do to limit the risk relative to the mobile devices?

Use the CYOD enterprise deployment model instead.

Ensure devices are not used for personal activities.

Ensure OTA updates are being applied.

Replace the devices with newer models.

Answer explanation

Replacing the devices with newer models is essential to mitigate security risks and ensure compatibility with current applications. Older devices may lack necessary updates and features, increasing vulnerability.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An elderly person withdraws money from an ATM at a bus terminal. They are speaking on their cell phone and overlook retrieving the bank card from the card reader. A malicious actor is watching and steals the card. Unfortunately, the card has a small piece of tape with the PIN. The attacker waits a couple of hours after the elderly person has boarded a bus and goes to the ATM to withdraw money. Even though the elderly person has not yet realized their card is missing, the attacker is unsuccessful. Which of the following most likely thwarted the attacker's intent?

Geolocation

Face recognition

Answer explanation

Face recognition likely thwarted the attacker's intent by verifying the identity of the person attempting to withdraw money, preventing unauthorized access despite having the card and PIN.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Geolocation can identify the location of an individual. It can also be used to reduce bank card fraud. When a user makes a transaction at a specific location, the bank can immediately check the location of the user's authorized cell phone. If the cell phone and the bank card are in the same place, then that can be one item of several to validate the legitimacy of the purchase; however, if the cell phone is in a distant location, the transaction may be rejected. Which of the following is NOT a reason a bank transaction may be rejected?

The cell phone is in a distant location

The cell phone is not authorized

The PIN was incorrect

An incorrect quick-response OTP

Answer explanation

The cell phone being in a distant location is a reason for potential rejection, but it is not a definitive reason like an incorrect PIN or OTP. Thus, it is the correct choice as it does not guarantee rejection.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Excel is watching a game with friends in a public forum. He is an avid fan and enjoys debating how his favorite player happens to be the best player in the league. Shortly after the game he receives a message on his mobile device with a link purporting to be advertising T-shirts and other merchandise with his favorite player. What may have caused this to happen?

Malware on his phone turned on the geotracking app.

Malware on his phone was engaged in unauthorized recording.

Someone in the public forum who knows Excel is a threat actor.

The Bluetooth-enabled television heard his conversation.

Answer explanation

The correct choice is that malware on Excel's phone was engaged in unauthorized recording. This could have allowed the malware to capture his conversation about his favorite player, leading to targeted advertisements.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An individual places a new USB cable near one of the charging stations at a busy airport. They wait from a nearby distance hoping someone will use the cable. What is the intent of the individual?

To send malicious commands to the device.

To be able to use someone else's internet connection.

To use the cable as a tracking device.

To use the cable as an antenna to intercept traffic.

Answer explanation

The individual likely intends to send malicious commands to a device that connects to the USB cable, exploiting it for unauthorized access or control, which aligns with common tactics used in cyber attacks.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?