Correct
8
Question
An attacker has targeted Corp.com's employees with voicemails that attempt to acquire sensitive information by masquerading as a trustworthy entity. Which type of attack is this?
Correct
Which model uses a sequential design process?
CORRECT
Which type of residential lock is most often used for keeping out intruders?
CORRECT
A lock that extends a solid metal bar into the door frame for extra security is the _____.
CORRECT
Which of the following is a cumulative package of all patches?
CORRECT
Which stage is a "quality assurance" test that verifies the code functions as intended?
CORRECT
Which of these is a list of approved email senders?
CORRECT
Which statement about a mantrap is true?
CORRECT
Which type of operating system runs on a firewall, router, or switch?
CORRECT
Which of the following is NOT a characteristic of an alarmed carrier PDS?
CORRECT
How can an SDIO card be made secure?
CORRECT
Which of the following is NOT a motion detection method?
CORRECT
Which of the following is NOT a reason why supply chain infections are considered especially dangerous?
CORRECT
How does heuristic detection detect a virus?
INCORRECT
What allows for a single configuration to be set and then deployed to many or all users?
CORRECT
Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?
CORRECT
Which of the following types of testing uses unexpected or invalid inputs?
CORRECT
Which of the following can be used to secure a laptop or mobile device?
CORRECT
Which of the following is NOT an advantage to an automated patch update service?
CORRECT
Which of the following is NOT a typical OS security configuration?
CORRECT
Which of the following is NOT a memory vulnerability?
CORRECT
Pakpao has been asked to provide research regarding a new company initiative to add Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Pakpao NOT list in his report as a factor in the frequency of Android firmware OTA updates?
CORRECT
Which tool manages the distribution and control of apps?
CORRECT
What does containerization do?
CORRECT
Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regarding a serious malware incident. What technology will she use?
CORRECT
Which technology is NOT a core feature of a mobile device?
CORRECT
Which of these is considered the strongest type of passcode to use on a mobile device?
CORRECT
Which of the following technologies provides for pictures, video, or audio to be included in text messages?
CORRECT
Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo's opinion regarding its security. What would Paavo tell him about USB OTG security?
CORRECT
What prevents a mobile device from being used until the user enters the correct passcode?
CORRECT
Which type of OS is typically found on an embedded system?
CORRECT
What allows a device to be managed remotely?
CORRECT
Which of these is NOT a risk of connecting a mobile device to a public network?
CORRECT
What enforces the location in which an app can function by tracking the location of the mobile device?
CORRECT
A friend of Ukrit told him that he has just downloaded and installed an app that allows him to circumvent the built-in limitations on his Apple iOS smartphone. What is this called?
CORRECT
Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. Which configuration setting is enabled on Gaetan's mobile device?
CORRECT
Agape was asked to make a recommendation regarding short-range wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she NOT consider due to its slow speed and its low deployment levels today?
CORRECT
Which of these is NOT a security feature for locating a lost or stolen mobile device?
CORRECT
Calista is designing the specifications for new laptop computers to be purchased by her company. She is comparing the different types and sizes of USB connections found on the devices. Which type USB connection would she NOT find on a laptop?
CORRECT
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?
CORRECT
What is the process of identifying the geographical location of a mobile device?
CORRECT
Comments
Post a Comment