Which of the following features and factors contribute to the vulnerability of mobile devices

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (20)

Which technology is NOT a characteristic of a mobile device?
a. physical keyboard
b. small form factor
c.. local nonremovable storage
d. data synchronization capabilities

a. physical keyboard

Each optional feature is found on most mobile devices EXCEPT ________.
a. digital camera
b. microphone
c. operating system
d. removable storage media

c. operating system

Which type of computer most closely resembles a desktop computer?
a. notebook
b. subnotebook
c. laptop
d. netbook

c. laptop

Tablet computers are designed for ________.
a. processing capabilities
b. ease of use
c. wireless connection speed
d. hardware upgrades

b. ease of use

One of the first mobile devices was a ________.
a. personal digital assistant (PDA)
b. tablet
c. smartphone
d. notebook

a. personal digital assistant (PDA)

Which of these is NOT a size of SD cards?
a. smallSD
b. miniSD
c. microSD
d. full SD

a. smallSD

Which of these is NOT a risk of connecting a mobile device to a public network?
a. public networks are beyond the control of the employee's organization
b. public networks may be susceptible to man-in-the-middle attacks
c. public networks are faster than local networks and can spread malware more quickly to mobile devices
d. replay attacks can occur on public networks

c. public networks are faster than local networks and can spread malware more quickly to mobile devices

Mobile devices using ________ are at increased risk of targeted physical attacks.
a. GPS
b. captive portals
c. location services
d. Internet filters

c. location services

What is one reason Android devices are considered to be at a higher security risk than iOS devices?
a. iOS has been available longer and has more of its vulnerabilities worked out
b. Android apps can be sideloaded
c. all Android apps are free
d. Apple apps are written in a more secure binary language

b. Android apps can be sideloaded

Which of these can a QR code NOT contain?
a. image
b. URL
c. email address
d. phone number

a. image

What prevents a mobile device from being used until the user enters the correct passcode?
a. swipe identifier (SW-ID)
b. keyboard
c. touch pad
d. lock screen

d. lock screen

Bob has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. This means that Bob's mobile device is configured to ________.
a. reset to factory settings
b. extend the lockout period
c. use PIN codes as passcodes
d. double the amount of time he is prevented from accessing his device

a. reset to factory settings

What does containerization do?
a. it splits operating system functions only on specific brands of mobile devices
b. it places all keys in a special vault
c. it slows down a mobile device to half speed
d. it separates personal data from corporate data

d. it separates personal data from corporate data

What allows a device to be managed remotely?
a. mobile device management (MDM)
b. mobile application management (MAM)
c. mobile resource management (MRM)
d. mobile wrapper management (MWM)

a. mobile device management (MDM)

Which of these is NOT a security feature for location a lost or stolen mobile device?
a. remote lockout
b. last known good configuration
c. alarm
d. thief picture

b. last known good configuration

What enforces the location in which an app can function by tracking the location of the mobile device?
a. location resource management
b. geo-fencing
c. geo-tagging
d. Graphical Management Tracking (GMT)

b. geo-fencing

Which of these is NOT an advantage of BYOD for an organization?
a. flexibility
b. cost increases
c. increased employee performance
d. reduced internal service

b. cost increases

Which mobile device is the smallest?
a. subnotebook
b. laptop
c. notebook
d. desktop

a. subnotebook

Where does a web-based computer store user files?
a. on its hard disk drive
b. on the Internet
c. on a microSD card
d. on a Type II PC card

b. on the Internet

Which of these is NOT a type of SD card?
a. Standard-Capacity
b. High-Capacity
c. Low-Capacity
d. eXtended-Capacity

c. Low-Capacity

Recommended textbook solutions

Which of the following features and factors contribute to the vulnerability of mobile devices

Engineering Electromagnetics

8th EditionJohn Buck, William Hayt

483 solutions

Which of the following features and factors contribute to the vulnerability of mobile devices

Computer Organization and Architecture

10th EditionWilliam Stallings

497 solutions

Which of the following features and factors contribute to the vulnerability of mobile devices

Starting Out with Python, Global Edition

3rd EditionTony Gaddis

602 solutions

Which of the following features and factors contribute to the vulnerability of mobile devices

Problem Solving with C++

1st EditionWalter Savitch

Sets with similar terms

SEC+ Chapter 10 STUDY

30 terms

jvbbb808

CIT 270 Chapter 10 Questions

30 terms

jace_gummersall

Chapter 10: Mobile Device Security

20 terms

saberdragon65

Mark Ciampa SY0-401 CHAPTER 10 Mobile Device Secur…

20 terms

asaelpaniagua

Sets found in the same folder

Chapter 9 Quetins

20 terms

AustinSmith950

Security+ Chapters 15 quiz

20 terms

Sara_voeks1

Chapter 12: Authentication and Account Management…

25 terms

Carissa_Lawrence

System Security Ch8

25 terms

Kenny232323

Other sets by this creator

chapter 10 important terms

10 terms

faithoh

chapter 9 important terms

2 terms

faithoh

chapter 5

15 terms

faithoh

chapter 3

13 terms

faithoh

Verified questions

COMPUTER SCIENCE

Write a program that asks the user to enter today’s sales for five stores. The program should then display a bar graph comparing each store’s sales. Create each bar in the bar graph by displaying a row of asterisks. Each asterisk should represent $100 of sales. Here is an example of the program’s output. Enter today's sales for store 1: 1000 [Enter] Enter today's sales for store 2: 1200 [Enter] Enter today's sales for store 3: 1800 [Enter] Enter today's sales for store 4: 800 [Enter] Enter today's sales for store 5: 1900 [Enter] SALES BAR CHART (Each * =$100) Store 1: ********** Store 2: ************ Store 3: ****************** Store 4: ******** Store 5: *******************

Verified answer

COMPUTER SCIENCE

Prove that the determinant of a lower-triangular or upper-triangular matrix is equal to the product of its diagonal elements. Prove that the inverse of a lower-triangular matrix, if it exists, is lower-triangular.

Verified answer

COMPUTER SCIENCE

Is it always crucial to know that the message you have sent has arrived at its destination safely? If your answer is “yes,” explain why. If your answer is "no", give appropriate examples.

Verified answer

COMPUTER SCIENCE

What header file must you include in a program using the character conversion functions toupper and tolower?

Verified answer

Other Quizlet sets

Chapter 11 Building a PC

61 terms

MarloH1337

new , 1,2,3,4,5,6

113 terms

cesarepm

ISDS 1100 Practice Test (1-3)

276 terms

amaygree

BPA

20 terms

Rachel_Santos2

Related questions

QUESTION

What is a positive aspect of using relative URL's?

2 answers

QUESTION

what is a network attached storage (NAS) device?

14 answers

QUESTION

Where do you find the checksum value in a data packet?

5 answers

QUESTION

To improve the success rates for uploads to S3 buckets that are larger than 100 MB, AWS recommends you use which feature?

3 answers

What are the vulnerabilities of a mobile device?

The 9 Most Common Security Threats to Mobile Devices in 2021.
Social Engineering..
Data Leakage via Malicious Apps..
Unsecured Public WiFi..
End-to-End Encryption Gaps..
Internet of Things (IoT) Devices..
Spyware..
Poor Password Habits..
Lost or Stolen Mobile Devices..

Why computers and mobile devices are vulnerable to attacks?

The lack of encrypted communication can allow malware to access the network and propagate Trojans and viruses throughout the organization. More serious is the fact that it can allow intrusion into the enterprise, which can then compromise the entire organization.

What are the five main reasons for the increase in threats to mobile devices?

Here are our top 5 reasons to protect your mobile with security software..
Mobile malware. Mobile malware is thriving, and evolving. ... .
Loss or theft. ... .
Social media. ... .
The not-so-smart user. ... .
Mixing business with pleasure..

What are features of mobile device security?

Mobile Device Security Best Practices.
Enable user authentication..
Always run updates..
Avoid public wifi..
Use a password manager..
Enable remote lock..
Cloud backups..
Use MDM/MAM..