FedVTE Mobile and Device Security
Latest 2022
Mobile OS vulnerabilities are typically used to perform jailbreaking of devices. ✔✔True
Windows Phone encrypts both apps and user content (e.g. pictures) on the SD card. ✔
...
FedVTE Mobile and Device Security
Latest 2022
Mobile OS vulnerabilities are typically used to perform jailbreaking of devices. ✔✔True
Windows Phone encrypts both apps and user content (e.g. pictures) on the SD card. ✔✔False
Which of the following are attacks against Near Field Communications (NFC)? ✔✔All of the
above
What two components of a Windows Phone ensure integrity of the boot process? ✔✔UEFI &
TPM
Depending on the class, Bluetooth devices are capable of transmitting up to 1000 feet. ✔✔False
Which of the following is not used to transmit data? ✔✔AMPS - Advanced Mobile Phone
System
Social Media can be of no useful service for businesses. ✔✔False
All four of the latest versions of the major mobile operating systems have a remote wipe
capability. ✔✔True
Which of the following is not a Bluetooth threat? ✔✔Bluejamming
Which of the following is not a type of Phishing? ✔✔Blishing - Bluetooth Phishing
When analyzing a device image, only a copy of the original should be used. ✔✔True
Website usernames and passwords are always encrypted. ✔✔False
Ad Hoc networks contain access points and infrastructure networks are peer to peer. ✔✔False
Which of the following does not support S/MIME by default? ✔✔Android
Security Set Identifiers (SSID)s can be turned off so that all devices will be unable to detect
them. ✔✔False
What document should provide guidance to employees on use of social media? ✔✔Code of
Conduct
Windows SmartScreen Filter increases the resolution on Windows Phones. ✔✔False
When investigating a mobile device, after determining the device is safe to handle, network
connectivity should be disabled to avoid: ✔✔The owner performing a remote wipe
What are the design objectives for 4G LTE? ✔✔All of the above
Wiped iPhones can still receive iMessages. ✔✔True
Which of the following is an encryption standard for 802.11 networks using IEEE 802.1X
authentication? ✔✔802.11i
OMB mandates which of the following? ✔✔Encryption of sensitive date on mobile devices
Forensic tools typically access device data by taking advantage of a mobile OS vulnerability.
✔✔False
Which US carrier primarily used the IDen standard? ✔✔Sprint/Nextel
What is "Catfishing"? ✔✔Creating a false or exagerated social media site
[Show More]