Home / CSE MCQs / Mobile Security ::

CSE MCQs :: Mobile Security

  1. Windows Mobile applications can now be digitally signed. What's the advantage of this feature for enterprise security?
  2. A.
    To prevent applications from leaking unauthorized data
    B.
    To keep users from altering device application settings
    C.
    To help users distinguish between legitimate programs and malware
    D.
    To enable applications to send log data back to administrators

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. How can you prevent the theft of your laptop?
  4. A.
    When in use, secure it with a locking cable
    B.
    When storing it, put it in a locked drawer
    C.
    When travelling, keep it with you until it can be locked up safely
    D.
    All of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. What does activation do?
  6. A.
    Safe Surfing
    B.
    Parental Controls
    C.
    Data Theft Scanner
    D.
    All of these

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. What are the minimum system requirements to install mobile security?
  8. A.
    Operating System
    B.
    Storage space
    C.
    Memory
    D.
    All of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. What are the main benefits of Mobile Security?
  10. A.
    For users, mobile security settings can be enabled to provide additional protection when accessing Box from their mobile devices
    B.
    For admins, Box mobile app management features provide visibility into all account activity"”including users and their files"”and let admins manage how content is shared and accessed both inside and outside the company
    C.
    Both of these
    D.
    None

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. The early FM push-to-talk telephone systems were used in
  12. A.
    Simplex mode
    B.
    Half duplex mode
    C.
    Full duplex mode
    D.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. If you use a public computer, before leaving you should
  14. A.
    Log out of your VPN session
    B.
    Delete any confidential files you downloaded, and empty the recycle bin
    C.
    Clear the browser history and close the browser
    D.
    All of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. Which of the following mobile data security strategies should your employees use?
  16. A.
    Protecting data on lost and stolen devices
    B.
    Application security
    C.
    Secure Web browsing habits
    D.
    All of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. As of August 2011, which operating system owned the most market share in the smartphone sector?
  18. A.
    Google Android
    B.
    Apple
    C.
    Microsoft
    D.
    None

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. If you have to leave your computer in a car, you should put it:
  20. A.
    In the trunk
    B.
    On the front seat
    C.
    On the floor
    D.
    All of the above

    View Answer

    Workspace

    Discuss Discuss in Forum