Upgrade to remove ads
CNA 210 Chapter 10
Terms in this set (56)
Portable computing devices generally larger than smartphones and smaller than notebooks; Classified by their screen size
Has all the tools that a feature phone has but also includes an OS that allows it to run apps and access the internet
Devices that can be worn by the user instead of carried
Have similar hardware and run the same OS and application software found on a desktop computer
A smaller version of a laptop computer
Contains a limited version of the Linux OS and a web browser; Designed to be used while connected to the Internet
A proprietary wireless network technology used primarily by sensors for communicating data
Bring your own device (BYOD)
Allows users to use their own personal mobile devices for business purposes
Corporate owned, personally enabled (COPE)
Employees chose from a selection of company approved devices
Choose your own device (CYOD)
Employees choose from a limited selection of approved devices, but the employee pays the upfront cost of the device while business own contract
Virtual desktop infrastructure (VDI)
Stores sensitive applications and data on a remote server that is accessed through a smartphone
Device is purchased and owned by the enterprise
What percent of all healthcare security breaches were the result of the loss or theft of a mobile device?
One-quarter of all laptop thefts occur where?
Adding geographical identification data to media, geo-tagging
The process of identifying the geographical location of the device
A mobile device with an active Internet connection can be used to share that connection with other mobile devices through Bluetooth or Wi-Fi
USB On-the-Go (OTG)
A mobile device with a USB connection can act as either a host or a peripheral used for external media access
Connecting to public networks
Mobile devices must at time use public external networks for Internet access
Quick Response (QR) codes
A matrix or two-dimensional barcode which can be read by an imaging device
Short message service (SMS)
Text messages of a maximum of 160 characters
Multimedia messaging service (MMS)
Provides for pictures, video, or audio to be included in text messages
Which of the following is not an increasingly used form of wearable technology?
a. Sleep monitor
b. Google Glass
c. Fitness tracker
d. Smart watch
Which of the following mobile device deployment models stores sensitive data on a remote server rather than the user's device?
10 square miles
Cellular telephony cells are approximately what size in a typical city?
The most common locations for laptop theft are: _________________.
c. Personal residences
d. Public schools
Security can be insured by obtaining apps only from the Apple Store or Google Play Store [True or False]
The device automatically unlocks and stays unlocked until a specific action occurs
Carriers build surveillance into their networks
Over-the-top (OTT) content
Delivery of content over the internet without telecoms being directly involved
Apple and Google possess decryption keys necessary to unlock data on their servers; Courts routinely server order to Apple and Google to provide data stored on their servers
Separating business data from personal data
Separating storage into separate business and personal "containers" and managing each appropriately
Erases sensitive data stored on the device, when the device has been stolen
Mobile Device Management (MDM)
Tools that allow a device to be managed remotely by an organization
Mobile Application Management (MAM)
Tools and services responsible for distributing and controlling access to apps
Sets up a "dynamic" library of software routines and adds to an existing program to restrict parts of an app
Newer OSs have MAM incorporated into the software itself, without needing MDM first [True or False]
Used to support the creation and editing/modification of digital content by multiple employees
Mobile Content Management (MCM)
Is tuned to provide content management to hundreds or even thousands of mobile devices used by employees in an enterprise
Apps can ask the user for authentication (like a password) before opening [True or False]
Ensures that only preapproved apps can run on the device
Uses the device's GPS to define geographical boundaries where the app can be used
A computer hardware and software contained within a larger system designed for a specific function
Industrial Control Systems (ICS)
control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control devices such as:
By a larger Supervisory Control and Data Acquisition (SCADA) system
How are multiple ICSs managed?
System on a chip (SoC)
All the necessary hardware components contained on a single microprocessor chip
Real-time Operating System (RTOS)
Software designed for an SoC in an embedded system
Internet of Things (IoT)
Connecting any device to the Internet for the purpose of sending and receiving data to be acted upon
Body area networks (BAN)
A network system of IoT devices in close proximity to a person's body that cooperate for the benefit of the user
Autonomous body sensor network (ABSN)
Introduces actuators in addition to the sensors so immediate effects can be made on the human body
Which is a more secure method of unlocking a screen: short PIN or swipe pattern?
True or False: Disabling Bluetooth is a recommended security step?
Mobile device management
The technology that includes a server component that sends out commands and a client component on a phone/laptop/tablet that receives and applies the commands is called ___________________________.
A management feature that sends an alert when a device is carried into a restricted physical area is known as __________________.
The structural software for an embedded system is known as ____.
THIS SET IS OFTEN IN FOLDERS WITH...
CNA 210 Chapter 1 and 2
Intro to Network Security sixth ed chapter 3
Intro to Network Security sixth ed chapter 4
CNA 210 Chapter 4
YOU MIGHT ALSO LIKE...
Mobile and Embedded Device Security ch 10
Intro to Network Security sixth ed chapter 10
CIS ch 10
Computer Engineering II 204
OTHER SETS BY THIS CREATOR
CNA 234 CH4
CNA 210 Chapter 14 (Chapter 15 Remix)
CNA 210 Chapter 15
CNA 221 Chapter 10
OTHER QUIZLET SETS
HIST Quiz 5
PH test I