Mobile Security(Engineering > Computer Science And Engineering ) Questions and Answers

Question 1. Windows Mobile applications can now be digitally signed. What's the advantage of this feature for enterprise security?
  1.    To prevent applications from leaking unauthorized data
  2.    To keep users from altering device application settings
  3.    To help users distinguish between legitimate programs and malware
  4.    To enable applications to send log data back to administrators
Explanation:-
Answer: Option C. -> To help users distinguish between legitimate programs and malware





Question 2. What does activation do?
  1.    Safe Surfing
  2.    Parental Controls
  3.    Data Theft Scanner
  4.    All of these
Explanation:-
Answer: Option D. -> All of these





Question 3. How can you prevent the theft of your laptop?
  1.    When in use, secure it with a locking cable
  2.    When storing it, put it in a locked drawer
  3.    When travelling, keep it with you until it can be locked up safely
  4.    All of the above
Explanation:-
Answer: Option D. -> All of the above





Question 4. What are the main benefits of Mobile Security?
  1.    For users, mobile security settings can be enabled to provide additional protection when accessing Box from their mobile devices
  2.    For admins, Box mobile app management features provide visibility into all account activity"”including users and their files"”and let admins manage how content is shared and accessed both inside and outside the company
  3.    Both of these
  4.    None
Explanation:-
Answer: Option C. -> Both of these





Question 5. What are the minimum system requirements to install mobile security?
  1.    Operating System
  2.    Storage space
  3.    Memory
  4.    All of the above
Explanation:-
Answer: Option D. -> All of the above





Question 6. The early FM push-to-talk telephone systems were used in
  1.    Simplex mode
  2.    Half duplex mode
  3.    Full duplex mode
  4.    None of the above
Explanation:-
Answer: Option B. -> Half duplex mode





Question 7. If you have to leave your computer in a car, you should put it:
  1.    In the trunk
  2.    On the front seat
  3.    On the floor
  4.    All of the above
Explanation:-
Answer: Option C. -> On the floor





Question 8. If you use a public computer, before leaving you should
  1.    Log out of your VPN session
  2.    Delete any confidential files you downloaded, and empty the recycle bin
  3.    Clear the browser history and close the browser
  4.    All of the above
Explanation:-
Answer: Option D. -> All of the above





Question 9. Which of the following mobile data security strategies should your employees use?
  1.    Protecting data on lost and stolen devices
  2.    Application security
  3.    Secure Web browsing habits
  4.    All of the above
Explanation:-
Answer: Option D. -> All of the above





Question 10. As of August 2011, which operating system owned the most market share in the smartphone sector?
  1.    Google Android
  2.    Apple
  3.    Microsoft
  4.    None
Explanation:-
Answer: Option A. -> Google Android