12.6.5 PQ NET126
Joe, a mobile device user, is allowed to connect his personally owned tablet to a company's network. Which of the following policies defines how company data is protected on Joe's tablet?
BYOD Policy
A user has configured their mobile device to unlock with facial recognition. Which of the following methods for securing the mobile device is being used?
Biometric authentication
You are comparing methods for securing your mobile device. Which of the following is the BEST method to secure your device's storage?
Full device encryption
Which of the following are devices categorized as part of the Internet of Things (IoT)? (Select two.)
Medical sensors Smartwatches
After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to their mobile phone. Which of the following digital security methods is being used?
Multifactor authentication
Which of the following help to improve the security of sensitive information on your mobile device if it is lost or stolen? (Select three.)
Remote wipe A screen lock Locator applications
A technician suspects that an app on a tablet device may be surreptitiously using the camera without permission. Which of the following would be the BEST way to troubleshoot this issue?
Run an anti-malware scan.
Maria, a smartphone user, has recently installed a new app. She now experiences a weak signal and sometimes a complete signal loss at locations where she used to have a good cellular signal. Her phone battery is fully charged. Which of the following actions would BEST address this issue?
Uninstall the new app and scan for malware.
You are walking through a shopping mall. Your smartphone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of this message?
Unintended Wi-Fi connections
Mobile device applications fall into two categories. Some are reviewed, approved, and signed with a certificate by the app service, while others are not.
Which category do apps fall into if they have been reviewed, approved, and signed with a certificate? Trusted What category do apps fall into if they have not been reviewed, approved, and signed with a certificate? Untrusted