Search Header Logo

Practice: Mobile and Embedded Device Security

Authored by Wayground CTE

Information technology (IT)

9th Grade

Practice: Mobile and Embedded Device Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user wants the most secure screen lock that still allows quick access without typing. Which lock method best meets both requirements?

Fingerprint recognition

Swipe pattern

PIN code

Facial recognition with attention detection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee reports their company phone was left on a train and cannot be recovered. Which action should the IT technician take first to protect corporate data?

Change the employee's email password

Issue a remote wipe command through the MDM console

Disable the employee's network account

File a police report on behalf of the company

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A school district deploys tablets for students and wants to prevent anyone from accessing them after five failed PIN attempts. Which setting should the technician configure?

Locator application trigger

Failed login attempt lockout policy

Remote wipe threshold

On-device firewall rule

4.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

A technician is securing a new Android phone before issuing it to a remote worker. Which TWO actions directly protect data stored on the device?

Turning on Bluetooth discoverability

Applying the latest OS security update

Connecting the device to a public Wi-Fi network

Enabling full device encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A manager needs to locate a lost company iPhone before deciding whether to wipe it. Which feature should already be enabled on the device to support this?

On-device antivirus

Find My iPhone or a similar locator application

Device encryption

Automatic OS update scheduling

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company allows employees to use personal phones for work email under a BYOD policy. Which profile security requirement best limits corporate data exposure on personal devices?

Enrolling the device in an MDM with a separate work profile

Issuing each employee a secondary corporate device

Requiring employees to disable all third-party apps

Blocking the employee's personal account from the mail server

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A smart thermostat in a corporate office still uses the factory default admin password. What is the PRIMARY security risk this creates?

The thermostat may drain the building's electrical supply

Unauthorized users can access and control the device remotely

The device will stop receiving firmware updates automatically

Other IoT devices on the network will lose connectivity

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?