Which of the following sets consists of only the core features of a mobile or computing device?
correct answers Small form factor, mobile operating system, wireless data network interface for
internet access, app stores, local non-removable data storage
Which of the following sets only lists additional features of a mobile device or a computing
device? correct answers Global positioning system (GPS), microphone and/or digital camera,
wireless cellular connection for voice communications, wireless personal area network interfaces
such as Bluetooth or near-field-communications (NFC), removable storage media
Which of the following mobile device features senses movements that it then uses to ensure the
screen is always oriented upright? correct answers Accelerometer
John has been appointed as a product manager at a large mobile device manufacturing company.
He is designing the core features included in their flagship mobile device that will be launched
during the holiday shopping season. Which of the following features should he primarily
include? correct answers Data synchronization with a remote server or separate device
Dan uses his personal laptop for writing the script for an upcoming high-budget, highly
anticipated movie. To keep the script private, he decided not to connect his laptop to any network
and updated his system with the latest virus definitions and security patches. Which of the
following is Dan's laptop still vulnerable to? correct answers Malicious USB
Peter is a design engineer at a mobile device manufacturing company. He is designing the core
components included in their flagship mobile device being launched during year-end 2020. Peter
wants to design a tablet component that would detect vibrations and movements and determine
the device's orientation so that the screen image is always displayed upright. Which of the
following are materials he should use for developing this component? correct answers
Piezoelectric, piezoresistive, and capacitive components
Walter's organization is in the beginning stages of a new project. His team is tasked with finding
a tool that must have the following features, allowing it to be remotely managed by the
, organization: correct answers MDM, because it allows remote management and over the air
updates.
Which one of the following is the most appropriate explanation of photoplethysmography?
correct answers Measuring heart rate by tracking changes in green light absorption, since human
blood absorbs green light
In which of the following mobile device connectivity methods are transmitters connected
through a mobile telecommunication switching office (MTSO) that controls all of the
transmitters in the cellular network and serves as the link between the cellular network and the
wired telephone world? correct answers Cellular
In which of the following mobile device connectivity methods are light waves used as a
communication channel? correct answers Infrared
Marcus is an information security architect at a product-based IT firm. He is responsible for
developing policies for the most-secure mobile device enterprise-deploying model. The company
will decide the level of choice and freedom for employees. Employees are supplied company-
chosen and paid-for devices that they can use for both professional and personal activities. This
action is performed under which enterprise deployment model? correct answers Corporate-
owned, personally enabled (COPE)
Anola is the security administrator in XYZ consulting. She is asked to suggest a deployment
method where the data is stored in a completely secure, centralized server and accessed by
authorized employees using their own devices. Which deployment should Anola choose? correct
answers Virtual desktop infrastructure (VDI)
Sean is an information security architect at a financial firm. As his first project, he must design
and build an efficient, sure-shot, yet cost-effective solution to detect and prevent bank credit card
fraud. How should Sean proceed? correct answers Design a solution that keeps track of dates,
times, locations of transactions, and geolocation of the authorized cell phone. When a user makes
a purchase at a store, the bank can immediately check that the cell phone and the bank card are in
the same place. If they are, the purchase is considered legitimate. But if they are not, then the
payment is rejected.