Chapter 5 (fundamentals of Cybersecurity)

Chapter 5 (fundamentals of Cybersecurity)

University

13 Qs

quiz-placeholder

Similar activities

Basic on Operating System

Basic on Operating System

University

10 Qs

10-mavzu. Ma’lumotlarni o‘chirish va yangilash

10-mavzu. Ma’lumotlarni o‘chirish va yangilash

University

17 Qs

Communications and Technology

Communications and Technology

University

15 Qs

CP N5 Theory Test 1

CP N5 Theory Test 1

University

10 Qs

Computer Science: Computer Systems

Computer Science: Computer Systems

6th Grade - University

10 Qs

CompTIA Core 2  20221023

CompTIA Core 2 20221023

University

10 Qs

Networking 101

Networking 101

University

13 Qs

Komponen Jaringan & Pengkabelan

Komponen Jaringan & Pengkabelan

University

15 Qs

Chapter 5 (fundamentals of Cybersecurity)

Chapter 5 (fundamentals of Cybersecurity)

Assessment

Quiz

Computers

University

Medium

Created by

Kelly Gafford

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered a mobile device?

tablet

phablet

smartphone

desktop computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When using a mobile device, you may want to consider turning off your location on some or all of your apps.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks (PANs).
Wireless
WIFI
Bluetooth 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bluetooth is a wireless connectivity method that allows devices to communicate with each other over short distances.

True

False

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is a common enterprise deployment model for mobile devices?

Corporate-Owned, Personally Enabled (COPE)

Choose Your One Desktop (CYOD)

Bring Your Own Device (BYOD)

None are correct

All are correct

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are common mobile device vulnerabilities?

Malware

Phishing

Weak passwords

All are correct

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is safe to access untrusted content on a mobile device without using a VPN.

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?