FedVTE Mobile and Device Security Latest 2022
FedVTE Mobile and Device Security Latest 2022 Mobile OS vulnerabilities are typically used to perform jailbreaking of devices. True Windows Phone encrypts both apps and user content (e.g. pictures) on the SD card. False Which of the following are attacks against Near Field Communications (NFC)? All of the above What two components of a Windows Phone ensure integrity of the boot process? UEFI & TPM Depending on the class, Bluetooth devices are capable of transmitting up to 1000 feet. False Which of the following is not used to transmit data? AMPS - Advanced Mobile Phone System Social Media can be of no useful service for businesses. False All four of the latest versions of the major mobile operating systems have a remote wipe capability. True Which of the following is not a Bluetooth threat? Bluejamming Which of the following is not a type of Phishing? Blishing - Bluetooth Phishing When analyzing a device image, only a copy of the original should be used. True Website usernames and passwords are always encrypted. False Ad Hoc networks contain access points and infrastructure networks are peer to peer. False Which of the following does not support S/MIME by default? Android Security Set Identifiers (SSID)s can be turned off so that all devices will be unable to detect them. False What document should provide guidance to employees on use of social media? Code of Conduct Windows SmartScreen Filter increases the resolution on Windows Phones. False When investigating a mobile device, after determining the device is safe to handle, network connectivity should be disabled to avoid: The owner performing a remote wipe What are the design objectives for 4G LTE? All of the above Wiped iPhones can still receive iMessages. True Which of the following is an encryption standard for 802.11 networks using IEEE 802.1X authentication? 802.11i OMB mandates which of the following? Encryption of sensitive date on mobile devices Forensic tools typically access device data by taking advantage of a mobile OS vulnerability. False Which US carrier primarily used the IDen standard? Sprint/Nextel What is "Catfishing"? Creating a false or exagerated social media site
Written for
- Institution
- FedVTE Mobile and Device Security
- Course
- FedVTE Mobile and Device Security
Document information
- Uploaded on
- December 31, 2022
- Number of pages
- 3
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
fedvte mobile and device security latest 2022
-
mobile os vulnerabilities are typically used to perform jailbreaking of devices true
Also available in package deal