9.7.5 Mobile Device Security

Ace your homework & exams now with Quizwiz!

b

Joe, a user, is walking through a shopping mall. His phone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of these messages? A• Unauthorized location tracking B• Unintended Wi-Fi connections C• Weak or dropped cellular signal D• Leaked personal files

Trusted

Which category do apps fall into if they have been signed with a certificate?

ae

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO). A• Lock the screen with some form of authentication. B• Keep an up-to-date remote backup. C• Turn off location services. D• Keep your device in your possession. E• Keep the operating system up to date. F• Avoid anti-virus apps.

bcf

Which of the following will improve the security of sensitive information on your device if it is lost or stolen? (Select THREE.) A• Remote backup B• A screen lock C• Locator applications D• Keeping up to date with OS updates and patches E• Anti-malware software F• Remote wipe

biometric

Which type of authentication would require a user fingerprint or facial recognition for a user to get past the screen lock on a mobile device and gain access to the device?

be

You have an executive user who keeps sensitive information about the company on a company-owned mobile device. You want to be prepared to keep company information secure if he loses this device or if it gets stolen. Which of the following solutions should you use? (Select TWO.) A• Mobile device management software that allows automatic detection of unfamiliar networks. B• Mobile device management software that performs remote wipes. C• Mobile device management software that automatically detects network firewalls. D• Mobile device management software that provides pop-up blocking. E• Mobile device management software that performs full device encryption.

a

A mobile device has poor performance and is slow to respond to screen inputs. After troubleshooting, a technician decides to perform a factory reset. Which of the following actions should a technician take before doing so? A• Back up all data to an attached computer or a cloud backup service. B• Ensure that the battery is fully charged. C• Close all running applications. D• Perform a remote wipe to clear any personal data.

d

A mobile device user is comparing methods for securing the device. Which of the following methods for securing a mobile device can affect the device's performance? A• Biometric authentication B• Locator applications C• Remote backup applications D• Full device encryption

d

A technician is tasked with configuring a user's personal tablet to connect to the corporate network. Which of the following should be performed before configuring access? A• Check that the battery is fully charged.. B• Reset the tablet to factory defaults. C• Close all running apps. D• Check the tablet for unauthorized root access.

a

A technician suspects that an app on a tablet device may be surreptitiously using the camera without permission. Which of the following would be the BEST way to troubleshoot this issue? A• Run an anti-malware scan. B• Remove all Bluetooth pairings. C• Perform a soft reset on the device. D• Check the results of a cell tower analyzer.

d

A technician was tasked with implementing a solution that would allow the IT department to push OS updates to mobile devices in order to keep them updated and secure. Which of the following would provide that capability? A• Updating the firewall settings on the mobile device. B• Installing an authenticator application. C• Modifying the security profile on all devices. D• Using Mobile Device Management (MDM).

d

A user has configured his mobile device to unlock using facial recognition. Which of the following methods for securing a mobile device is being used? A• An antivirus application B• Trusted source C• A locator application D• Biometric authentication

c

A user is choosing a method to secure a mobile device. Which of the following types of screen locks is LEAST secure? A• Face lock B• Fingerprint lock C• Swipe lock D• Passcode lock

d

After entering a user id and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used? A• DLP B• Firewall C• Smart card D• Multifactor authentication

Untrusted

What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?

ae

You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do? (Select TWO. Each option is part of the complete solution.) A• Disable the Simple Passcode option. B• Enable the Restrictions option. C• Enable the Require Passcode option. D• Enable the Wipe Drive option. E• Enable the Erase Data option. F• Enable the Complex Passcode option.


Related study sets

AP Final lets go win this test yeah

View Set

6.RP.3 Ratio Tools and Proportional Relationships

View Set

week 9 carmen quiz: continuous random variables

View Set

Pharmacology Exam II Review Questions

View Set

Chapter 11 Soil: Foundation for Land Ecosystems

View Set

chp 3 practice exam (fun.int.bus.)

View Set