Testout: 12.6 Mobile Device Security 12.6.5 Practice Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following help to improve the security of sensitive information on your mobile device if it is lost or stolen? (Select three.) Answer A screen lock Remote backup Anti-malware software A firewall Up-to-date OS updates and patches Locator applications Remote wipe

A screen lock Remote wipe Locator applications

Joe, a mobile device user, is allowed to connect his personally owned tablet to a company's network. Which of the following policies defines how company data is protected on Joe's tablet? Answer Device Encryption Policy Remote Backup Policy Trusted Sources Policy BYOD Policy

BYOD Policy

A user has configured their mobile device to unlock with facial recognition. Which of the following methods for securing the mobile device is being used? Answer Antivirus application Locator application Trusted source Biometric authentication

Biometric authentication

You are comparing methods for securing your mobile device. Which of the following is the BEST method to secure your device's storage? Answer Biometric authentication Locator applications Full device encryption Remote backup applications

Full device encryption

This method encrypts every single sector of the device's storage

Full device encryption Regardless of whether it has data or not, this protects the entirety of the device, including deleted files. If a mobile device doesn't encrypt contents by default, it's important to make sure that full device encryption is enable and configured.

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to their mobile phone. Which of the following digital security methods is being used? Answer Firewall Multifactor authentication DLP Smart card

Multifactor authentication

Which type of device encryption does not encrypt deleted files?

Partial device encryption. With this method, only the sections of the device's storage that contain files are encrypted. This type of encryption is fast, but it doesn't encrypt deleted files, which can be recovered using special software.

A technician suspects that an app on a tablet device may be surreptitiously using the camera without permission. Which of the following would be the BEST way to troubleshoot this issue? Answer Remove all Bluetooth pairings. Perform a soft reset on the device. Run an anti-malware scan. Check the results of a cell tower analyzer.

Run an anti-malware scan.

Which of the following are devices categorized as part of the Internet of Things (IoT)? (Select two.) Answer Routers Smartwatches Medical sensors Tablets Laptops

Smartwatches Medical sensors

Mobile device applications fall into two categories. Some are reviewed, approved, and signed with a certificate by the app service, while others are not. Which category do apps fall into if they have been reviewed, approved, and signed with a certificate? What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?

TRUSTED: Which category do apps fall into if they have been reviewed, approved, and signed with a certificate? UNTRUSTED: What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?

Maria, a smartphone user, has recently installed a new app. She now experiences a weak signal and sometimes a complete signal loss at locations where she used to have a good cellular signal. Her phone battery is fully charged. Which of the following actions would BEST address this issue? Answer Reset to factory defaults. Force stop the new app. Use a cell tower analyzer to determine normal signal strength. Uninstall the new app and scan for malware.

Uninstall the new app and scan for malware.

You are walking through a shopping mall. Your smartphone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of this message? Answer Weak or dropped cellular signal Leaked personal files Unintended Wi-Fi connections Unauthorized location tracking

Unintended Wi-Fi connections


संबंधित स्टडी सेट्स

Chapter 35, 36, 37, 38 study guide questions and assigned ATI

View Set

Quantitative Methods in Business Exam 1

View Set

Ch. 2 Quiz- International Finance

View Set

Catcher in the Rye test Questions

View Set

Chapter 21: Family-Centered Care of the Child During Illness and Hospitalization

View Set

Fundamentals Ch. 32 Skin integrity and Wound care

View Set