Mobile and embedded device security quizz

Mobile and embedded device security quizz

University

10 Qs

quiz-placeholder

Similar activities

Part 1 Cloud

Part 1 Cloud

University - Professional Development

10 Qs

1.1.6 Embedded Systems

1.1.6 Embedded Systems

1st Grade - University

10 Qs

The Broadband Internet Connection

The Broadband Internet Connection

9th Grade - University

11 Qs

Introduction to Computer and Media Tools

Introduction to Computer and Media Tools

University

10 Qs

Pretest - PaDC

Pretest - PaDC

University

15 Qs

Chap2-Class1-Internet

Chap2-Class1-Internet

University

9 Qs

Chapter 6

Chapter 6

University

12 Qs

Introduction to Mobile Commerce

Introduction to Mobile Commerce

University

10 Qs

Mobile and embedded device security quizz

Mobile and embedded device security quizz

Assessment

Quiz

Computers

University

Hard

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technology is NOT a core feature of a mobile device?

Physical keyboard

Local non-removable data storage

Small form factor

Data synchronization capabilities

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a risk of connecting a mobile device to a public network?

Public networks are beyond the control of the employee's organization.

Replay attacks can occur on public networks.

Public networks may be susceptible to man-in-the-middle attacks.

Public networks are faster than local networks and can spread malware more quickly to mobile devices.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technologies provides for pictures, video, or audio to be included in text messages?

MMS

QR

SMS

ANT

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What prevents a mobile device from being used until the user enters the correct passcode?

swipe identifier (SW-ID)

screen lock

screen timeout

touch swipe

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What allows a device to be managed remotely?

mobile device management (MDM)

mobile application management (MAM)

mobile resource management (MRM)

mobile wrapper management (MWM)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is considered the strongest type of passcode to use on a mobile device?

password

PIN

fingerprint swipe

draw connecting dots pattern

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool manages the distribution and control of apps?

MAM

MDM

MCM

MFM

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?