
Mod 06 Mobile and Embedded Device Security
Authored by willie reynolds
Instructional Technology
Vocational training

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
37 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why has there been a heightened interest by threat actors toward attacking mobile devices?
They have limited OTA capabilities.
They have access to sensitive data.
They use wireless technology.
They are easy to steal.
Answer explanation
Threat actors are increasingly targeting mobile devices because they contain sensitive data, such as personal information and financial details, making them lucrative targets for attacks.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A parent, who is a small business owner, takes their child on a business trip. The child uses the parent's phone during the flight. Unfortunately, the child leaves the phone on the plane, but the parent realizes it after it is too late to retrieve it. What kind of security could have prevented this type of vulnerability?
Screen lock
Remote wipe
Physical security
Location tracking
Answer explanation
Physical security could have prevented the child from leaving the phone on the plane by ensuring the device was securely attached or stored, reducing the risk of loss during travel.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A small company decides to adopt the COPE enterprise deployment model and supplies Android devices to its employees. Due to a significant downturn in the economy, they have not upgraded the devices in five years. What should the company do to limit the risk relative to the mobile devices?
Use the CYOD enterprise deployment model instead.
Ensure devices are not used for personal activities.
Ensure OTA updates are being applied.
Replace the devices with newer models.
Answer explanation
Replacing the devices with newer models is essential to mitigate security risks and ensure compatibility with current applications. Older devices may lack necessary updates and features, increasing vulnerability.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An elderly person withdraws money from an ATM at a bus terminal. They are speaking on their cell phone and overlook retrieving the bank card from the card reader. A malicious actor is watching and steals the card. Unfortunately, the card has a small piece of tape with the PIN. The attacker waits a couple of hours after the elderly person has boarded a bus and goes to the ATM to withdraw money. Even though the elderly person has not yet realized their card is missing, the attacker is unsuccessful. Which of the following most likely thwarted the attacker's intent?
Geolocation
Face recognition
Answer explanation
Face recognition likely thwarted the attacker's intent by verifying the identity of the person attempting to withdraw money, preventing unauthorized access despite having the card and PIN.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Geolocation can identify the location of an individual. It can also be used to reduce bank card fraud. When a user makes a transaction at a specific location, the bank can immediately check the location of the user's authorized cell phone. If the cell phone and the bank card are in the same place, then that can be one item of several to validate the legitimacy of the purchase; however, if the cell phone is in a distant location, the transaction may be rejected. Which of the following is NOT a reason a bank transaction may be rejected?
The cell phone is in a distant location
The cell phone is not authorized
The PIN was incorrect
An incorrect quick-response OTP
Answer explanation
The cell phone being in a distant location is a reason for potential rejection, but it is not a definitive reason like an incorrect PIN or OTP. Thus, it is the correct choice as it does not guarantee rejection.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Excel is watching a game with friends in a public forum. He is an avid fan and enjoys debating how his favorite player happens to be the best player in the league. Shortly after the game he receives a message on his mobile device with a link purporting to be advertising T-shirts and other merchandise with his favorite player. What may have caused this to happen?
Malware on his phone turned on the geotracking app.
Malware on his phone was engaged in unauthorized recording.
Someone in the public forum who knows Excel is a threat actor.
The Bluetooth-enabled television heard his conversation.
Answer explanation
The correct choice is that malware on Excel's phone was engaged in unauthorized recording. This could have allowed the malware to capture his conversation about his favorite player, leading to targeted advertisements.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An individual places a new USB cable near one of the charging stations at a busy airport. They wait from a nearby distance hoping someone will use the cable. What is the intent of the individual?
To send malicious commands to the device.
To be able to use someone else's internet connection.
To use the cable as a tracking device.
To use the cable as an antenna to intercept traffic.
Answer explanation
The individual likely intends to send malicious commands to a device that connects to the USB cable, exploiting it for unauthorized access or control, which aligns with common tactics used in cyber attacks.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?