Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Stephen Davis

1. Which two security risks apply to IM chatting?


a. B,C
2. 3G networks use packet-switching to route voice calls.
a. F
3. _________ is a form of messaging used to share pictures, text pages, and ringtones.
a. MMS
4. 4G network speeds are comparable to DSL and cable modem internet services.
a. T
5. Which of the following risks does not apply to internet browsing.
a. B
6. ________ is the threat related to voice communications and involves an unauthorized party
listening in on conversations.
a. Eavesdropping
7. The term endpoint is typically used to determine what type of device?
a. D
8. What is the minimum strength recommended for whole-device encryption?
a. B
9. The term _____ describes the merging of various types of devices and technologies into a
common or single form.
a. Convergence
10. Which two controls provide physical security for devices.
a. B,C
11. A handoff, or the transfer of communications from one cell to another, was a significant factor
regarding the mobility and popularity of cellular phones.
a. T
12. Which form of communication is compatible across nearly all cellular networks and is widely
considered to be the most often used communication method, by quantity, on today’s phones?
a. A
13. Which of these mobile risks are included among the OWASP Top 10?
a. A,B,D
14. The OWASP mobile risk “Security Decisions Via Untrusted Inputs” refers to what unsecure
practice?
a. B
15. What are two popular ways that web sites arrange a session?
a. A,D

You might also like