Mobile Security(Engineering > Computer Science And Engineering ) Questions and Answers
Question 1. Windows Mobile applications can now be digitally signed. What's the advantage of this feature for enterprise security?
To prevent applications from leaking unauthorized data
To keep users from altering device application settings
To help users distinguish between legitimate programs and malware
To enable applications to send log data back to administrators
Explanation:-
Answer: Option C. -> To help users distinguish between legitimate programs and malware
Question 2. What does activation do?
Safe Surfing
Parental Controls
Data Theft Scanner
All of these
Explanation:-
Answer: Option D. -> All of these
Question 3. How can you prevent the theft of your laptop?
When in use, secure it with a locking cable
When storing it, put it in a locked drawer
When travelling, keep it with you until it can be locked up safely
All of the above
Explanation:-
Answer: Option D. -> All of the above
Question 4. What are the main benefits of Mobile Security?
For users, mobile security settings can be enabled to provide additional protection when accessing Box from their mobile devices
For admins, Box mobile app management features provide visibility into all account activity"”including users and their files"”and let admins manage how content is shared and accessed both inside and outside the company
Both of these
None
Explanation:-
Answer: Option C. -> Both of these
Question 5. What are the minimum system requirements to install mobile security?
Operating System
Storage space
Memory
All of the above
Explanation:-
Answer: Option D. -> All of the above
Question 6. The early FM push-to-talk telephone systems were used in
Simplex mode
Half duplex mode
Full duplex mode
None of the above
Explanation:-
Answer: Option B. -> Half duplex mode
Question 7. If you have to leave your computer in a car, you should put it:
In the trunk
On the front seat
On the floor
All of the above
Explanation:-
Answer: Option C. -> On the floor
Question 8. If you use a public computer, before leaving you should
Log out of your VPN session
Delete any confidential files you downloaded, and empty the recycle bin
Clear the browser history and close the browser
All of the above
Explanation:-
Answer: Option D. -> All of the above
Question 9. Which of the following mobile data security strategies should your employees use?
Protecting data on lost and stolen devices
Application security
Secure Web browsing habits
All of the above
Explanation:-
Answer: Option D. -> All of the above
Question 10. As of August 2011, which operating system owned the most market share in the smartphone sector?