Module 35 - Mobile Security - Q&A Flashcards

1
Q
Which of the following are ways that centralized mobile device management uses location services? (Choose two.)
A. Remote wiping
B. Asset tracking
C. Mobile application management
D. Asset inventory
A

B. D. Centralized mobile device management uses location services to enable asset tracking and inventory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following cannot be controlled through Mobile Device Management (MDM) software?
A. User applications
B. Content filtering
C. Security configuration
D. Device location
A

D. MDM can control all of these items except the location of the device itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following involves including metadata in a file that embeds the location of the device when the file was created or processed?
A. Geofencing
B. Geotagging
C. Content filtering
D. Geocaching
A

B. Geotagging embeds metadata in a file that contains the location of the device when the file was created or processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Your manager wants you to include a configuration file in the MDM software that contains all of the mobile apps that are pre-approved for use on the company's mobile devices. Which of the following terms describes this practice?
A. Containerization
B. Sandboxing
C. Application whitelisting
D. Application blacklisting
A

C. Application whitelisting enables an administrator to configure mobile devices to use only approved apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
You are trying to troubleshoot an issue with a mobile device authenticating to the network. The device seems to have issues with establishing a secure connection to the VPN server. Which of the following configuration items should be checked to ensure that the device is configured properly on both the mobile client and the VPN server?
A. Encryption settings
B. Username and password
C. Mobile device IP address
D. VPN server IP address
A

A. The encryption settings used to establish a secure connection between a mobile device and the VPN server must be compatible on both devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following are typical actions that could cause a device to be wiped? (Choose two.)
A. Detection of malware on the device
B. A user inputting an incorrect passcode too many times
C. An administrator issuing a remote command to wipe the device
D. Failure of a screen to unlock

A

B. C. A device can be remotely wiped by the administrator, or configured to initiate the wiping process after the passcode has been entered incorrectly too many times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following would enable an administrator to impose different access controls on different types of data residing on a mobile device?
A. Mobile application management
B. Storage segmentation
C. Geofencing
D. Application whitelisting
A

B. Storage segmentation would enable an administrator to impose different access controls on different types of data on a mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All of the following are valid BYOD concerns, except.
A. Privacy
B. Data ownership
C. Support ownership
D. Internet restrictions for company-provided devices

A

D. Internet restrictions are a valid concern, but not one specifically associated with BYOD, since the answer specifies that they are company owned devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following types of policies dictates what users can and cannot do with mobile devices issued to the users by the company?
A. Access control policy
B. Data backup policy
C. Acceptable use policy
D. Equipment care and use policy
A

C. An acceptable use policy dictates what users can and cannot do with mobile devices issued to the users by the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following device functions may be strictly limited when using mobile devices in certain sensitive areas?
A. Text messaging
B. Onboard camera and video
C. Personal e-mail
D. Incoming phone calls
A

B. Onboard camera and video functions may be restricted by policy when using mobile devices in sensitive areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly