12.6.5

¡Supera tus tareas y exámenes ahora con Quizwiz!

Joe, a mobile device user, is allowed to connect his personally owned tablet to a company's network. Which of the following policies defines how company data is protected on Joe's tablet? Answer BYOD Policy Trusted Sources Policy Device Encryption Policy Remote Backup Policy

BYOD Policy

A user has configured their mobile device to unlock with facial recognition. Which of the following methods for securing the mobile device is being used? Answer Trusted source Biometric authentication Antivirus application Locator application

Biometric authentication

You are comparing methods for securing your mobile device. Which of the following is the BEST method to secure your device's storage? Answer Biometric authentication Locator applications Remote backup applications Full device encryption

Full device encryption

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to their mobile phone. Which of the following digital security methods is being used? Answer DLP Firewall Smart card Multifactor authentication

Multifactor authentication

Which of the following help to improve the security of sensitive information on your mobile device if it is lost or stolen? (Select three.) Answer A firewall A screen lock Up-to-date OS updates and patches Remote backup Locator applications Remote wipe Anti-malware software

Remote wipe Locator applications A screen lock

A technician suspects that an app on a tablet device may be surreptitiously using the camera without permission. Which of the following would be the BEST way to troubleshoot this issue? Answer Check the results of a cell tower analyzer. Run an anti-malware scan. Perform a soft reset on the device. Remove all Bluetooth pairings.

Run an anti-malware scan.

Which of the following are devices categorized as part of the Internet of Things (IoT)? (Select two.) Answer Routers Tablets Medical sensors Smartwatches Laptops

Smartwatches Medical sensors

Mobile device applications fall into two categories. Some are reviewed, approved, and signed with a certificate by the app service, while others are not. Which category do apps fall into if they have been reviewed, approved, and signed with a certificate? What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?

Trusted Untrusted

Maria, a smartphone user, has recently installed a new app. She now experiences a weak signal and sometimes a complete signal loss at locations where she used to have a good cellular signal. Her phone battery is fully charged. Which of the following actions would BEST address this issue? Answer Uninstall the new app and scan for malware. Force stop the new app. Use a cell tower analyzer to determine normal signal strength. Reset to factory defaults.

Uninstall the new app and scan for malware.

You are walking through a shopping mall. Your smartphone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of this message? Answer Unauthorized location tracking Weak or dropped cellular signal Leaked personal files Unintended Wi-Fi connections

Unintended Wi-Fi connections


Conjuntos de estudio relacionados

DLC 111 Intro to grammar and writing

View Set

EMT - Chapter 20 Immunologic Emergencies.

View Set

Chapters #34, 35, 36, and 37: Ecology

View Set

Fordney Insurance Handbook - Chapter 8

View Set

Chapter 26: Disorders of Blood Flow and Blood Pressure Regulation

View Set

US History since 1865 Final Exam

View Set

Lesson Quiz 3-1 The Constitution

View Set

Personal Financial Planning Exam 2

View Set