hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
infosec
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
mod5
Terms in this set (40)
Akira is explaining to his team members the security constraints that have made it a challenge for protecting a new embedded system. Which of the following would Akira NOT include as a constraint?
availability
Agape has been asked to experiment with different hardware to create a controller for a new device on the factory floor. She needs a credit-card-sized motherboard that has a microcontroller instead of a microprocessor. Which would be the best solution?
Arduino
Hakaku needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution?
UEM
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?
CYOD
Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates?
Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks.
What is the process of identifying the geographical location of a mobile device?
geolocation
Which of these is used to send SMS text messages to selected users or groups of users?
Push notification services
Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki's advice regarding its. Which of the following would Enki NOT tell him?
USB OTG is only available for connecting Android devices to a subnotebook.
Banko's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called?
rooting
Which of the following technologies can convert a texting app into a live chat platform?
RCS
What prevents a mobile device from being used until the user enters the correct passcode?
screen lock
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document?
Apple uses file-based encryption to offer a higher level of security.
What does containerization do?
It separates personal data from corporate data.
What allows a device to be managed remotely?
Mobile device management (MDM)
Which of these is NOT a security feature for locating a lost or stolen mobile device?
last known good configuration
What enforces the location in which an app can function by tracking the location of the mobile device?
Geofencing
Which of these is considered the strongest type of passcode to use on a mobile device?
password
Which of the following is NOT a context-aware authentication?
trusted places
Which tool manages the distribution and control of apps?
MAM
Which type of OS is typically found on an embedded system?
RTOS
Which of the following hides the existence of information?
Steganography
Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as?
Nonrepudiation
Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this?
ROT13
Which of the following is FALSE about "security through obscurity"?
unknown
What is low latency?
The time between when a byte is input into a cryptographic cipher and when the output is obtained.
What are public key systems that generate different random public keys for each session?
Perfect forward secrecy
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
plaintext
Which of these is NOT a basic security protection for information that cryptography can provide?
risk
Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest?
SHA3-512
Which of the following is NOT a symmetric cryptographic algorithm?
SHA
Which of the following is not to be decrypted but is only used for comparison purposes?
digest
Which of these is NOT a characteristic of a secure hash algorithm?
Collisions should occur no more than 15 percent of the time.
Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond?
As computers become more powerful, the ability to compute factoring has increased.
Which of these is the strongest symmetric cryptographic algorithm?
Advanced Encryption Standard
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Alice's public key
Egor wanted to use a digital signature. Which of the following benefits will the digital signature NOT provide?
verify the receiver
Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this?
downgrade attack
What is a collision?
two files produce the same digest
Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)?
unknown
Which of these provides cryptographic services and is external to the device?
Hardware Security Module (HSM)
Students also viewed
DOD initial orientation and awareness training
9 terms
Module 6 Basic Cyrptography REVIEW
20 terms
DOD Initial Orientation and Awareness Training (Fi…
10 terms
Initial Security Orientation Army
17 terms
Other sets by this creator
CNA 210 - Chapter 15
47 terms
Chapter 12
20 terms
Intro to Network Security sixth ed chapter 12
59 terms
CNA 210 - Chapter 4
118 terms