Chapter 5 (fundamentals of Cybersecurity)

Chapter 5 (fundamentals of Cybersecurity)

University

13 Qs

quiz-placeholder

Similar activities

2.5 Broadband Internet Service (Wireless)

2.5 Broadband Internet Service (Wireless)

University

8 Qs

Week8

Week8

University

12 Qs

Computer Hardware and Usability Quiz

Computer Hardware and Usability Quiz

12th Grade - University

12 Qs

Wiress Network

Wiress Network

University

10 Qs

Network

Network

University

10 Qs

Introduction to the Internet of Things

Introduction to the Internet of Things

12th Grade - Professional Development

15 Qs

Network

Network

University

10 Qs

CSC134 Chapter 8

CSC134 Chapter 8

University

17 Qs

Chapter 5 (fundamentals of Cybersecurity)

Chapter 5 (fundamentals of Cybersecurity)

Assessment

Quiz

Computers

University

Medium

Created by

Kelly Gafford

Used 1+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered a mobile device?

tablet

phablet

smartphone

desktop computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When using a mobile device, you may want to consider turning off your location on some or all of your apps.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks (PANs).
Wireless
WIFI
Bluetooth 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bluetooth is a wireless connectivity method that allows devices to communicate with each other over short distances.

True

False

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is a common enterprise deployment model for mobile devices?

Corporate-Owned, Personally Enabled (COPE)

Choose Your One Desktop (CYOD)

Bring Your Own Device (BYOD)

None are correct

All are correct

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are common mobile device vulnerabilities?

Malware

Phishing

Weak passwords

All are correct

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is safe to access untrusted content on a mobile device without using a VPN.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?