
CASP+: Chapter 7A Analyze Enterprise Mobility Protections

Quiz
•
Computers
•
University
•
Easy
Khairul Imtiyaz
Used 1+ times
FREE Resource
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following certificates is commonly used to implement access controls for mobile devices?
User certificates
Encryption certificates
Trust (device) certificates
Authentication certificates
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which standard is associated with the Simultaneous Authentication of Equals (SAE)?
WPA3 (Wi-Fi 6)
WPA2 (Wi-Fi 5)
IEEE 802.11n
IEEE 802.11ac
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of device attack allows complete control of a device without the target device being paired with the attacker?
BlueBorne
Man-in-the-Middle (MitM)
Distributed Denial-of-Service (DDoS)
Denial-of-Service (DoS)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a potential security threat posed by DNS over HTTPS (DoH) in an enterprise setting?
DoH relies on untrusted providers for DNS resolution.
DoH increases the efficiency of DNS resolution without impacting security.
DoH can bypass external DNS query restrictions configured on firewalls.
DoH encapsulates DNS traffic within HTTPS traffic, making it harder to identify.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can Bluetooth be used for physical reconnaissance?
Bluetooth facilitates the interception of encrypted communications between devices.
Bluetooth allows attackers to remotely access devices and extract sensitive information.
Bluetooth devices can be discovered using freely available tools, allowing attackers to locate out-of-sight devices.
Bluetooth enables attackers to launch denial-of-service attacks on nearby devices.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which technique is commonly used in iOS devices to gain root privileges and customize the device?
Using official rooting tools provided by Apple
Exploiting vulnerabilities in the bootloader
Systemless root method
Booting with a modified kernel
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a potential security risk associated with sideloading apps on Android devices?
Increased vulnerability to malware
Improved customization options
Enhanced app performance
Better compatibility with third-party stores
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Day 8 - Security I - 1st Review - Day 7 Review

Quiz
•
University
18 questions
Computer Networks Basics

Quiz
•
8th Grade - University
20 questions
Mobile Data Management Quiz

Quiz
•
University
20 questions
Computer Security Measures

Quiz
•
11th Grade - University
20 questions
CompTIA Sec+

Quiz
•
University - Professi...
20 questions
Digital Security Risks and Ethics

Quiz
•
University
20 questions
2 - Cybersecurity 101

Quiz
•
9th Grade - University
17 questions
Ch 4 Responsive design with Elementor

Quiz
•
9th Grade - University
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
10 questions
Chaffey

Quiz
•
9th - 12th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
22 questions
6-8 Digital Citizenship Review

Quiz
•
6th - 8th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade