12.6.5
Joe, a mobile device user, is allowed to connect his personally owned tablet to a company's network. Which of the following policies defines how company data is protected on Joe's tablet? Answer BYOD Policy Trusted Sources Policy Device Encryption Policy Remote Backup Policy
BYOD Policy
A user has configured their mobile device to unlock with facial recognition. Which of the following methods for securing the mobile device is being used? Answer Trusted source Biometric authentication Antivirus application Locator application
Biometric authentication
You are comparing methods for securing your mobile device. Which of the following is the BEST method to secure your device's storage? Answer Biometric authentication Locator applications Remote backup applications Full device encryption
Full device encryption
After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to their mobile phone. Which of the following digital security methods is being used? Answer DLP Firewall Smart card Multifactor authentication
Multifactor authentication
Which of the following help to improve the security of sensitive information on your mobile device if it is lost or stolen? (Select three.) Answer A firewall A screen lock Up-to-date OS updates and patches Remote backup Locator applications Remote wipe Anti-malware software
Remote wipe Locator applications A screen lock
A technician suspects that an app on a tablet device may be surreptitiously using the camera without permission. Which of the following would be the BEST way to troubleshoot this issue? Answer Check the results of a cell tower analyzer. Run an anti-malware scan. Perform a soft reset on the device. Remove all Bluetooth pairings.
Run an anti-malware scan.
Which of the following are devices categorized as part of the Internet of Things (IoT)? (Select two.) Answer Routers Tablets Medical sensors Smartwatches Laptops
Smartwatches Medical sensors
Mobile device applications fall into two categories. Some are reviewed, approved, and signed with a certificate by the app service, while others are not. Which category do apps fall into if they have been reviewed, approved, and signed with a certificate? What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?
Trusted Untrusted
Maria, a smartphone user, has recently installed a new app. She now experiences a weak signal and sometimes a complete signal loss at locations where she used to have a good cellular signal. Her phone battery is fully charged. Which of the following actions would BEST address this issue? Answer Uninstall the new app and scan for malware. Force stop the new app. Use a cell tower analyzer to determine normal signal strength. Reset to factory defaults.
Uninstall the new app and scan for malware.
You are walking through a shopping mall. Your smartphone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of this message? Answer Unauthorized location tracking Weak or dropped cellular signal Leaked personal files Unintended Wi-Fi connections
Unintended Wi-Fi connections