Computer Architecture > EXAM > FedVTE Mobile and Device Security Latest 2022 (All)
Mobile OS vulnerabilities are typically used to perform jailbreaking of devices. ✔✔True Windows Phone encrypts both apps and user content (e.g. pictures) on the SD card. ✔✔False Which of the... following are attacks against Near Field Communications (NFC)? ✔✔All of the above What two components of a Windows Phone ensure integrity of the boot process? ✔✔UEFI & TPM Depending on the class, Bluetooth devices are capable of transmitting up to 1000 feet. ✔✔False Which of the following is not used to transmit data? ✔✔AMPS - Advanced Mobile Phone System Social Media can be of no useful service for businesses. ✔✔False All four of the latest versions of the major mobile operating systems have a remote wipe capability. ✔✔TrueWhich of the following is not a Bluetooth threat? ✔✔Bluejamming Which of the following is not a type of Phishing? ✔✔Blishing - Bluetooth Phishing When analyzing a device image, only a copy of the original should be used. ✔✔True Website usernames and passwords are always encrypted. ✔✔False Ad Hoc networks contain access points and infrastructure networks are peer to peer. ✔✔False Which of the following does not support S/MIME by default? ✔✔Android Security Set Identifiers (SSID)s can be turned off so that all devices will be unable to detect them. ✔✔False What document should provide guidance to employees on use of social media? ✔✔Code of Conduct Windows SmartScreen Filter increases the resolution on Windows Phones. ✔✔False When investigating a mobile device, after determining the device is safe to handle, network connectivity should be disabled to avoid: ✔✔The owner perform [Show More]
Last updated: 10 months ago
Preview 2 out of 3 pages
Loading document previews ...
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 03, 2024
Number of pages
3
Written in
This document has been written for:
Uploaded
Aug 03, 2024
Downloads
0
Views
22
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·