
Chapter 5 (fundamentals of Cybersecurity)
Authored by Kelly Gafford
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT considered a mobile device?
tablet
phablet
smartphone
desktop computer
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When using a mobile device, you may want to consider turning off your location on some or all of your apps.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_______is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks (PANs).
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Bluetooth is a wireless connectivity method that allows devices to communicate with each other over short distances.
True
False
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What is a common enterprise deployment model for mobile devices?
Corporate-Owned, Personally Enabled (COPE)
Choose Your One Desktop (CYOD)
None are correct
All are correct
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are common mobile device vulnerabilities?
Malware
Phishing
Weak passwords
All are correct
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is safe to access untrusted content on a mobile device without using a VPN.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?