Business > EXAM > FedVTE Mobile and Device Security 25 Questions with Verified Answers,100% CORRECT (All)
FedVTE Mobile and Device Security 25 Questions with Verified Answers Mobile OS vulnerabilities are typically used to perform jailbreaking of devices. - CORRECT ANSWER True Windows Phone encrypts... both apps and user content (e.g. pictures) on the SD card. - CORRECT ANSWER False Which of the following are attacks against Near Field Communications (NFC)? - CORRECT ANSWER All of the above What two components of a Windows Phone ensure integrity of the boot process? - CORRECT ANSWER UEFI & TPM Depending on the class, Bluetooth devices are capable of transmitting up to 1000 feet. - CORRECT ANSWER False Which of the following is not used to transmit data? - CORRECT ANSWER AMPS - Advanced Mobile Phone System Social Media can be of no useful service for businesses. - CORRECT ANSWER False All four of the latest versions of the major mobile operating systems have a remote wipe capability. - CORRECT ANSWER True Which of the following is not a Bluetooth threat? - CORRECT ANSWER Bluejamming Which of the following is not a type of Phishing? - CORRECT ANSWER Blishing - Bluetooth Phishing When analyzing a device image, only a copy of the original should be used. - CORRECT ANSWER True Website usernames and passwords are always encrypted. - CORRECT ANSWER False Ad Hoc networks contain access points and infrastructure networks are peer to peer. - CORRECT ANSWER False Which of the following does not support S/MIME by default? - CORRECT ANSWER Android Security Set Identifiers (SSID)s can be turned off so that all devices will be unable to detect them. - CORRECT ANSWER False What document should provide guidance to employees on use of social media? - CORRECT ANSWER Code of Conduct Windows SmartScreen Filter increases the resolution on Windows Phones. - CORRECT ANSWER False When investigating a mobile device, after determining the device is safe to handle, network connectivity should be disabled to avoid: - CORRECT ANSWER The owner performing a remote wipe What are the design objectives for 4G LTE? - CORRECT ANSWER All of the above Wiped iPhones can still receive iMessages. - CORRECT ANSWER True Which of the following is an encryption standard for 802.11 networks using IEEE 802.1X authentication? - CORRECT ANSWER 802.11i OMB mandates which of the following? - CORRECT ANSWER Encryption of sensitive date on mobile devices Forensic tools typically access device data by taking advantage of a mobile OS vulnerability. - CORRECT ANSWER False Which US carrier primarily used the IDen standard? - CORRECT ANSWER Sprint/Nextel What is "Catfishing"? - CORRECT ANSWER Creating a false or exagerated social media site [Show More]
Last updated: 7 months ago
Preview 1 out of 3 pages
Instant download
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
Connected school, study & course
About the document
Uploaded On
Oct 10, 2023
Number of pages
3
Written in
This document has been written for:
Uploaded
Oct 10, 2023
Downloads
0
Views
59
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·