Search Header Logo

Chapter 5 (fundamentals of Cybersecurity)

Authored by Kelly Gafford

Computers

University

Used 2+ times

Chapter 5 (fundamentals of Cybersecurity)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered a mobile device?

tablet

phablet

smartphone

desktop computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When using a mobile device, you may want to consider turning off your location on some or all of your apps.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks (PANs).

Wireless
WIFI
Bluetooth 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bluetooth is a wireless connectivity method that allows devices to communicate with each other over short distances.

True

False

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is a common enterprise deployment model for mobile devices?

Corporate-Owned, Personally Enabled (COPE)

Choose Your One Desktop (CYOD)

Bring Your Own Device (BYOD)

None are correct

All are correct

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are common mobile device vulnerabilities?

Malware

Phishing

Weak passwords

All are correct

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is safe to access untrusted content on a mobile device without using a VPN.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?