Pervasive Computing and Mobile Computing Devices have to sacrifice certain functions. Which statement
concerning those devices is false.
A.
In many cases, security services have been enhanced due to the lack of services available.
B.
These devices share common security concerns with other resource-constrained devices.
C.
In many cases, security services have been sacrificed to provide richer user interaction when processing
power is very limited.
D.
Their mobility has made them a prime vector for data loss since they can be used to transmit and store
information in ways that may be difficult to control.
Explanation:
This is a detailed oriented question to test if you are paying attention to both the question and answer. While the
answer sounds legitimate, it is not truly the case in these types of devices. Just remember, even if you have
one service running, that does not mean you are secure if the service itself has not been secured. From the
official guide: “The number of small mobile devices has grown considerably in the past four or five years.
Products vary from sophisticated mobile phones, such as third-generation (3G) handsets, to full-featured
“netbooks” and personal digital assistants (PDAs). These devices share common security concerns with other
resource-constrained devices. In many cases, security services have been sacrificed to provide richer user
interaction when processing power is very limited. Also, their mobility has made them a prime vector for data
loss since they can be used to transmit and store information in ways that may be difficult to control.”Tipton, Harold F. (2010-04-20). Official (ISC)2 Guide to the CISSP CBK, Second Edition ((ISC)2 Press),Chapter 9, Security Architecture and Design