IT Questions and Answers :)

Thursday, May 23, 2019

Which of the following would you use to allow your users to discuss information on their mobile devices without having to travel to secure locations?

Which of the following would you use to allow your users to discuss information on their mobile devices without having to travel to secure locations?

  • Remote wipe
  • Voice encryption
  • Passcode policy
  • GPS tracking 

Which of the following would you use to allow your users to discuss information on their mobile devices without having to travel to secure locations?


EXPLANATION

Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP.

The implementation of voice encryption dates back to World War II when secure communication was paramount to the US armed forces. During that time, noise was simply added to a voice signal to prevent enemies from listening to the conversations. Noise was added by playing a record of noise in synch with the voice signal and when the voice signal reached the receiver, the noise signal was subtracted out,
leaving the original voice signal. In order to subtract out the noise, the receiver need to have exactly the same noise signal and the noise records were only made in pairs; one for the transmitter and one for the receiver. Having only two copies of records made it impossible for the wrong receiver to decrypt the signal. To implement the system, the army contracted Bell Laboratories and they developed a system called SIGSALY. With SIGSALY, ten channels were used to sample the voice frequency spectrum from 250 Hz to 3 kHz and two channels were allocated to sample voice pitch and background hiss. In the time of SIGSALY, the transistor had not been developed and the digital sampling was done by circuits using the model 2051 Thyratron vacuum tube. Each SIGSALY terminal used 40 racks of equipment weighing 55 tons and filled a large room. This equipment included radio transmitters and receivers and large phonograph turntables. The voice was keyed to two 16-inch vinyl phonograph records that contained a Frequency Shift Keying (FSK) audio tone. The records were played on large precise turntables in synch with the voice transmission.
From the introduction of voice encryption to today, encryption techniques have evolved drastically. Digital technology has effectively replaced old analog methods of voice encryption and by using complex algorithms, voice encryption has become much more secure and efficient. One relatively modern voice encryption method is Sub-band coding. With Sub-band Coding, the voice signal is split into multiple frequency bands, using multiple bandpass filters that cover specific frequency ranges of interest. The output signals from the bandpass filters are then lowpass translated to reduce the bandwidth, which reduces the sampling rate. The lowpass signals are then quantized and encoded using special techniques like, Pulse Code Modulation (PCM). After the encoding stage, the signals are multiplexed and sent out along the communication network. When the signal reaches the receiver, the inverse operations are applied to the signal to get it back to its original state.[1] A speech scrambling system was developed at Bell Laboratories in the 1970s by Subhash Kak and Nikil Jayant.[2] In this system permutation matrices were used to scramble coded representations (such as Pulse Code Modulation and variants) of the speech data. Motorola developed a voice encryption system called Digital Voice Protection (DVP) as part of their first generation of voice encryption techniques. DVP uses a self-synchronizing encryption technique known as cipher feedback (CFB). The basic DVP algorithm is capable of 2.36 x 1021 different "keys" based on a key length of 32 bits."[3] The extremely high number of possible keys associated with the early DVP algorithm, makes the algorithm very robust and gives a high level of security. As with other symmetric keyed encryption systems, the encryption key is required to decrypt the signal with a special decryption algorithm.


Share:

What does MEAP stand for?

What does MEAP stand for?

  • Mobile Early Access Program
  • Mobile Extensible Authentication Protocol
  • Mobile Enterprise Application Platform
  • Must Eat All of the Pizza 
What does MEAP stand for?

EXPLANATION

  A mobile enterprise application platform (MEAP) is a suite of products and services that enable development of mobile applications. The term was coined in a Gartner Magic Quadrant report in 2008 when they renamed their "multi-channel access gateway market

MEAPs address the difficulties of developing mobile software by managing the diversity of devices, networks and user groups at the time of deployment and throughout the mobile computing technology lifecycle. Unlike standalone apps, a MEAP provides a comprehensive, long-term approach to deploying mobility. Cross-platform considerations are one big driver behind using MEAPs. For example, a company can use a MEAP to develop the mobile application once and deploy it to a variety of mobile devices (including smart phones, tablets, notebooks and ruggedized handhelds) with no changes to the underlying business logic.[2]
Platform applications are best for companies that wish to deploy multiple applications on a single infrastructure, scaled to the size of their current mobile field force and available in an online and offline mode.[3] Mobile platforms provide higher level languages and easy development templates to simplify and speed the mobile application development timeframe, requiring less programming knowledge for mobile business application deployment.
Share:

Which of the following is NOT a type of Android passcode lock that your users can set?

Which of the following is NOT a type of Android passcode lock that your users can set?

  • Drawn pattern
  • CAPTCHA
  • Password
  • Numeric PIN 
Which of the following is NOT a type of Android passcode lock that your users can set?

EXPLANATION

 CAPTCHA: Telling Humans and Computers Apart Automatically

A CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot. For example, humans can read distorted text as the one shown below, but current computer programs can't:

The term CAPTCHA (for Completely Automated Public Turing Test To Tell Computers and Humans Apart) was coined in 2000 by Luis von Ahn, Manuel Blum, Nicholas Hopper and John Langford of Carnegie Mellon University.

Share:

Which of the following allows your phone to act as a mobile hotspot?

Which of the following allows your phone to act as a mobile hotspot?

  • Wi-Fi tethering
  • IMAP
  • Internet pass-through
  • USB switching 
Which of the following allows your phone to act as a mobile hotspot?

EXPLANATION

Tethering, or phone-as-modem (PAM), is the sharing of a mobile device's Internet connection with other connected computers. Connection of a mobile device with other devices can be done over wireless LAN (Wi-Fi), over Bluetooth or by physical connection using a cable, for example through USB.
If tethering is done over WLAN, the feature may be branded as a personal or mobile hotspot, which allows the device to serve as a portable router. Mobile hotspots may be protected by a PIN or password.[1] The Internet-connected mobile device can act as a portable wireless access point and router for devices connected to it.

 

Share:

What is the default TCP port number for SMTP?

What is the default TCP port number for SMTP?

  • 110
  • 143
  • 995
  • 25

What is the default TCP port number for SMTP?

EXPLANATION

 Simple Mail Transfer Protocol is an Internet standard for electronic mail transmission. First defined by in 1982, it was last updated in 2008 with Extended SMTP additions by, which is the protocol in widespread use today.

 The Simple Mail Transfer Protocol (SMTP) is a communication protocol for electronic mail transmission. As an Internet standard, SMTP was first defined in 1982 by RFC 821, and updated in 2008 by RFC 5321 to Extended SMTP additions, which is the protocol variety in widespread use today. Mail servers and other message transfer agents use SMTP to send and receive mail messages. Proprietary systems such as Microsoft Exchange and IBM Notes and webmail systems such as Outlook.com, Gmail and Yahoo! Mail may use non-standard protocols internally, but all use SMTP when sending to or receiving email from outside their own systems. SMTP servers commonly use the Transmission Control Protocol on port number 25.
User-level email clients typically use SMTP only for sending messages to a mail server for relaying, typically submit outgoing email to the mail server on port 587 or 465 as per RFC 8314. For retrieving messages, IMAP and POP3 are standard, but proprietary servers also often implement proprietary protocols, e.g., Exchange ActiveSync.
Share:

You want to add a security layer that maintains strict control over the apps your users can use. Which of the following best fulfills this requirement?

You want to add a security layer that maintains strict control over the apps your users can use. Which of the following best fulfills this requirement?

  • Lockout
  • Encryption
  • White listing
  • Black listing 
You want to add a security layer that maintains strict control over the apps your users can use. Which of the following best fulfills this requirement?

EXPLANATION

 Whitelisting is the practice of identifying entities that are provided a particular privilege, service, mobility, access or recognition. Entities on the list will be accepted, approved and/or recognized. Whitelisting is the reverse of blacklisting, the practice of identifying entities that are denied, unrecognised, or ostracised.

Share:

Which of the following is included in a BYOD (Bring Your Own Device) policy document?

Which of the following is included in a BYOD (Bring Your Own Device) policy document?

  • Data ownership
  • Transitive trust
  • Credential management
  • Key management

Which of the following is included in a BYOD (Bring Your Own Device) policy document?

EXPLANATION

 An identity platform system configured to authenticate a company-assigned device for accessing a first network using a first unique pre-shared key associated with the company-assigned device. A personal BYOD credential management system configured to authenticate a personal BYOD for accessing a second network using a second unique pre-shared key associated with the personal BYOD. A network administrator interface configured to provide access to the identity platform for a network administrator. A personal BYOD credential management system API included as part of the identity platform system and configured to provide the identity platform system access to the personal BYOD credential management system as if the personal BYOD credential management system is embedded in the identity platform system.

Share:

Popular Posts