Testout: 12.6 Mobile Device Security 12.6.5 Practice Questions
Which of the following help to improve the security of sensitive information on your mobile device if it is lost or stolen? (Select three.) Answer A screen lock Remote backup Anti-malware software A firewall Up-to-date OS updates and patches Locator applications Remote wipe
A screen lock Remote wipe Locator applications
Joe, a mobile device user, is allowed to connect his personally owned tablet to a company's network. Which of the following policies defines how company data is protected on Joe's tablet? Answer Device Encryption Policy Remote Backup Policy Trusted Sources Policy BYOD Policy
BYOD Policy
A user has configured their mobile device to unlock with facial recognition. Which of the following methods for securing the mobile device is being used? Answer Antivirus application Locator application Trusted source Biometric authentication
Biometric authentication
You are comparing methods for securing your mobile device. Which of the following is the BEST method to secure your device's storage? Answer Biometric authentication Locator applications Full device encryption Remote backup applications
Full device encryption
This method encrypts every single sector of the device's storage
Full device encryption Regardless of whether it has data or not, this protects the entirety of the device, including deleted files. If a mobile device doesn't encrypt contents by default, it's important to make sure that full device encryption is enable and configured.
After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to their mobile phone. Which of the following digital security methods is being used? Answer Firewall Multifactor authentication DLP Smart card
Multifactor authentication
Which type of device encryption does not encrypt deleted files?
Partial device encryption. With this method, only the sections of the device's storage that contain files are encrypted. This type of encryption is fast, but it doesn't encrypt deleted files, which can be recovered using special software.
A technician suspects that an app on a tablet device may be surreptitiously using the camera without permission. Which of the following would be the BEST way to troubleshoot this issue? Answer Remove all Bluetooth pairings. Perform a soft reset on the device. Run an anti-malware scan. Check the results of a cell tower analyzer.
Run an anti-malware scan.
Which of the following are devices categorized as part of the Internet of Things (IoT)? (Select two.) Answer Routers Smartwatches Medical sensors Tablets Laptops
Smartwatches Medical sensors
Mobile device applications fall into two categories. Some are reviewed, approved, and signed with a certificate by the app service, while others are not. Which category do apps fall into if they have been reviewed, approved, and signed with a certificate? What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?
TRUSTED: Which category do apps fall into if they have been reviewed, approved, and signed with a certificate? UNTRUSTED: What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?
Maria, a smartphone user, has recently installed a new app. She now experiences a weak signal and sometimes a complete signal loss at locations where she used to have a good cellular signal. Her phone battery is fully charged. Which of the following actions would BEST address this issue? Answer Reset to factory defaults. Force stop the new app. Use a cell tower analyzer to determine normal signal strength. Uninstall the new app and scan for malware.
Uninstall the new app and scan for malware.
You are walking through a shopping mall. Your smartphone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of this message? Answer Weak or dropped cellular signal Leaked personal files Unintended Wi-Fi connections Unauthorized location tracking
Unintended Wi-Fi connections