Chapter 5 (fundamentals of Cybersecurity)

Chapter 5 (fundamentals of Cybersecurity)

University

13 Qs

quiz-placeholder

Similar activities

input and output devices

input and output devices

University

10 Qs

Computer Hardware

Computer Hardware

University

10 Qs

Mobile Apps Development Quiz

Mobile Apps Development Quiz

University

10 Qs

Performing Computer Operations

Performing Computer Operations

University

15 Qs

Networks & Topologies

Networks & Topologies

10th Grade - University

15 Qs

IT Fundamentals 3 IoT

IT Fundamentals 3 IoT

12th Grade - University

15 Qs

IT 112 1ST LIVE QUIZ

IT 112 1ST LIVE QUIZ

University

15 Qs

bsab 1 quiz1

bsab 1 quiz1

University

10 Qs

Chapter 5 (fundamentals of Cybersecurity)

Chapter 5 (fundamentals of Cybersecurity)

Assessment

Quiz

Computers

University

Medium

Created by

Kelly Gafford

Used 1+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered a mobile device?

tablet

phablet

smartphone

desktop computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When using a mobile device, you may want to consider turning off your location on some or all of your apps.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks (PANs).
Wireless
WIFI
Bluetooth 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bluetooth is a wireless connectivity method that allows devices to communicate with each other over short distances.

True

False

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is a common enterprise deployment model for mobile devices?

Corporate-Owned, Personally Enabled (COPE)

Choose Your One Desktop (CYOD)

Bring Your Own Device (BYOD)

None are correct

All are correct

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are common mobile device vulnerabilities?

Malware

Phishing

Weak passwords

All are correct

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is safe to access untrusted content on a mobile device without using a VPN.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?