a. B,C 2. 3G networks use packet-switching to route voice calls. a. F 3. _________ is a form of messaging used to share pictures, text pages, and ringtones. a. MMS 4. 4G network speeds are comparable to DSL and cable modem internet services. a. T 5. Which of the following risks does not apply to internet browsing. a. B 6. ________ is the threat related to voice communications and involves an unauthorized party listening in on conversations. a. Eavesdropping 7. The term endpoint is typically used to determine what type of device? a. D 8. What is the minimum strength recommended for whole-device encryption? a. B 9. The term _____ describes the merging of various types of devices and technologies into a common or single form. a. Convergence 10. Which two controls provide physical security for devices. a. B,C 11. A handoff, or the transfer of communications from one cell to another, was a significant factor regarding the mobility and popularity of cellular phones. a. T 12. Which form of communication is compatible across nearly all cellular networks and is widely considered to be the most often used communication method, by quantity, on today’s phones? a. A 13. Which of these mobile risks are included among the OWASP Top 10? a. A,B,D 14. The OWASP mobile risk “Security Decisions Via Untrusted Inputs” refers to what unsecure practice? a. B 15. What are two popular ways that web sites arrange a session? a. A,D