13.3.12 Practice Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following describes Mobile Device Management software?

A combination of an on-device application or agent that communicates with a backend server to receive policies and settings.

Which of the following can void a mobile device's warranty, cause poor performance, or brick a mobile device (making it impossible to turn on or repair)?

Rooting or jailbreaking

James, a penetration tester, uses nmap to locate mobile devices attached to a network. Which of the following mobile device penetration testing stages is being implemented?

Footprinting

Which of the following describes the exploitation stage of the mobile device penetration testing process?

The use of man-in-the-middle attacks, spoofing, and other attacks to take advantage of client-side vulnerabilities.

Jose, a medical doctor, has a mobile device that contains sensitive patient information. He is concerned about unauthorized access to the data if the device is lost or stolen. Which of the following are the best options for preventing this from happening? (Select two.)

Configure the device to remotely wipe as soon as it is reported lost. Configure the device to wipe after a number of failed login attempts.

Which of the following mobile security best practices for users is concerned with geotags?

Don't auto-upload photos to social networks.

Which of the following steps in an Android penetration test checks for a vulnerability hackers use to break down the browser's sandbox using infected JavaScript code?

Check for a cross-application-scripting error

Alan, an ethical hacker, roots or jailbreaks a mobile device. He checks the inventory information reported by the mobile device management (MDM) software that manages the mobile device. Which of the following describes what he expects to see in the inventory?

The inventory will show the device as vulnerable.

Which of the following describes the risks of spyware that are particular to mobile devices?

Spyware can monitor and log call histories, GPS locations, and text messages.

Which of the following operating systems is the most prevalent in the smartphone market?

Android

Which of the following best describes this image?

The iOS operating system stack.

Which of the following mobile security concerns is characterized by malicious code that specifically targets mobile devices?

Malicious websites

Which of the following bring-your-own-device (BYOD) risks is both a security issue for an organization and a privacy issue for a BYOD user?

Mixing personal and corporate data

Linda, an Android user, wants to remove unwanted applications (bloatware) that are pre-installed on her device. Which of the following actions must she take?

Root the Android device.

Which of the following policies best governs the use of bring-your-own-device (BYOD) that connect with an organization's private network?

Acceptable use policy

Which key area in the mobile device security model is supported by device designers requiring passwords, biometrics, and two-factor authentication methods?

Access controls


Ensembles d'études connexes

Maternity And pediatrics Chapter 25 Growth and development of newborn and infant

View Set

Autism Spectrum Disorder Signs and Symptoms

View Set

Causes of the Civil War and its short and long term effects

View Set

G701-2017 Change Order, G702-1992 Application and Certificate for Payment, G703-1992 Continuation Sheet, G704-2000 Certificate of Substantial Completion

View Set