
Practice: Mobile and Embedded Device Security
Authored by Wayground CTE
Information technology (IT)
9th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user wants the most secure screen lock that still allows quick access without typing. Which lock method best meets both requirements?
Fingerprint recognition
Swipe pattern
PIN code
Facial recognition with attention detection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee reports their company phone was left on a train and cannot be recovered. Which action should the IT technician take first to protect corporate data?
Change the employee's email password
Issue a remote wipe command through the MDM console
Disable the employee's network account
File a police report on behalf of the company
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A school district deploys tablets for students and wants to prevent anyone from accessing them after five failed PIN attempts. Which setting should the technician configure?
Locator application trigger
Failed login attempt lockout policy
Remote wipe threshold
On-device firewall rule
4.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
A technician is securing a new Android phone before issuing it to a remote worker. Which TWO actions directly protect data stored on the device?
Turning on Bluetooth discoverability
Applying the latest OS security update
Connecting the device to a public Wi-Fi network
Enabling full device encryption
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A manager needs to locate a lost company iPhone before deciding whether to wipe it. Which feature should already be enabled on the device to support this?
On-device antivirus
Find My iPhone or a similar locator application
Device encryption
Automatic OS update scheduling
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company allows employees to use personal phones for work email under a BYOD policy. Which profile security requirement best limits corporate data exposure on personal devices?
Enrolling the device in an MDM with a separate work profile
Issuing each employee a secondary corporate device
Requiring employees to disable all third-party apps
Blocking the employee's personal account from the mail server
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A smart thermostat in a corporate office still uses the factory default admin password. What is the PRIMARY security risk this creates?
The thermostat may drain the building's electrical supply
Unauthorized users can access and control the device remotely
The device will stop receiving firmware updates automatically
Other IoT devices on the network will lose connectivity
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?