9.7.5 Testout CTI 130

¡Supera tus tareas y exámenes ahora con Quizwiz!

A mobile device has poor performance and is slow to respond to screen inputs. After troubleshooting, a technician decides to perform a factory reset. Which of the following actions should a technician take before doing so? Perform a remote wipe to clear any personal data. Close all running applications. Ensure that the battery is fully charged. Back up all data to an attached computer or a cloud backup service.

Back up all data to an attached computer or a cloud backup service.

A user has configured his mobile device to unlock using facial recognition. Which of the following methods for securing a mobile device is being used? Biometric authentication A locator application An antivirus application Trusted source

Biometric authentication

A technician is tasked with configuring a user's personal tablet to connect to the corporate network. Which of the following should be performed before configuring access? Reset the tablet to factory defaults. Check the tablet for unauthorized root access. Close all running apps. Check that the battery is fully charged..

Check the tablet for unauthorized root access.

You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do? (Select TWO. Each option is part of the complete solution.) Enable the Wipe Drive option. Enable the Erase Data option. Enable the Require Passcode option. Enable the Restrictions option. Disable the Simple Passcode option. Enable the Complex Passcode option.

Enable the Erase Data option. Disable the Simple Passcode option.

A mobile device user is comparing methods for securing the device. Which of the following methods for securing a mobile device can affect the device's performance? Biometric authentication Full device encryption Locator applications Remote backup applications

Full device encryption

Which of the following will improve the security of sensitive information on your device if it is lost or stolen? (Select THREE.) Keeping up to date with OS updates and patches Anti-malware software Locator applications Remote backup Remote wipe A screen lock

Locator applications Remote wipe A screen lock

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO). Lock the screen with some form of authentication. Keep an up-to-date remote backup. Keep the operating system up to date. Keep your device in your possession. Avoid anti-virus apps. Turn off location services.

Lock the screen with some form of authentication. Keep the operating system up to date.

You have an executive user who keeps sensitive information about the company on a company-owned mobile device. You want to be prepared to keep company information secure if he loses this device or if it gets stolen. Which of the following solutions should you use? (Select TWO.) Mobile device management software that performs remote wipes. Mobile device management software that allows automatic detection of unfamiliar networks. Mobile device management software that provides pop-up blocking. Mobile device management software that performs full device encryption . Mobile device management software that automatically detects network firewalls.

Mobile device management software that performs remote wipes. Mobile device management software that performs full device encryption.

After entering a user id and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used? Smart card Firewall DLP Multifactor authentication

Multifactor authentication

A technician suspects that an app on a tablet device may be surreptitiously using the camera without permission. Which of the following would be the BEST way to troubleshoot this issue? Remove all Bluetooth pairings. Check the results of a cell tower analyzer. Run an anti-malware scan. Perform a soft reset on the device.

Run an anti-malware scan.

A user is choosing a method to secure a mobile device. Which of the following types of screen locks is LEAST secure? Passcode lock Fingerprint lock Face lock Swipe lock

Swipe lock

Joe, a user, is walking through a shopping mall. His phone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of these messages? Leaked personal files Unauthorized location tracking Unintended Wi-Fi connections Weak or dropped cellular signal

Unintended Wi-Fi connections

A technician was tasked with implementing a solution that would allow the IT department to push OS updates to mobile devices in order to keep them updated and secure. Which of the following would provide that capability? Using Mobile Device Management (MDM). Modifying the security profile on all devices. Installing an authenticator application. Updating the firewall settings on the mobile device.

Using Mobile Device Management (MDM).

Which type of authentication would require a user fingerprint or facial recognition for a user to get past the screen lock on a mobile device and gain access to the device?

biometric authentication

Applications for mobile devices fall into two categories. Some have been reviewed, approved, and signed with a certificate by the app service, and some have not. Which category do apps fall into if they have been signed with a certificate? What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?

trusted untrusted


Conjuntos de estudio relacionados

CP (Cerebral Palsy) neuromuscular disorder

View Set

Chapter 23: Question 61 + all true and false

View Set

Enrichment Activity 26; The Cost of War

View Set

conceptual questions physics exam 3

View Set