Chapter 5 (fundamentals of Cybersecurity)

Chapter 5 (fundamentals of Cybersecurity)

University

13 Qs

quiz-placeholder

Similar activities

Mobile Devices and Networking Quiz

Mobile Devices and Networking Quiz

12th Grade - University

14 Qs

Network Types Quiz

Network Types Quiz

5th Grade - University

12 Qs

Managing Devices

Managing Devices

9th Grade - University

10 Qs

1.1.6 Embedded Systems

1.1.6 Embedded Systems

1st Grade - University

10 Qs

The Broadband Internet Connection

The Broadband Internet Connection

9th Grade - University

11 Qs

1.1 Types of Devices

1.1 Types of Devices

9th Grade - University

13 Qs

WJEC ICT  - Chapter 2 -  Connectivity Methods

WJEC ICT - Chapter 2 - Connectivity Methods

6th Grade - University

13 Qs

Computer Networks Basics

Computer Networks Basics

8th Grade - University

18 Qs

Chapter 5 (fundamentals of Cybersecurity)

Chapter 5 (fundamentals of Cybersecurity)

Assessment

Quiz

Computers

University

Medium

Created by

Kelly Gafford

Used 1+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered a mobile device?

tablet

phablet

smartphone

desktop computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When using a mobile device, you may want to consider turning off your location on some or all of your apps.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks (PANs).
Wireless
WIFI
Bluetooth 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bluetooth is a wireless connectivity method that allows devices to communicate with each other over short distances.

True

False

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is a common enterprise deployment model for mobile devices?

Corporate-Owned, Personally Enabled (COPE)

Choose Your One Desktop (CYOD)

Bring Your Own Device (BYOD)

None are correct

All are correct

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are common mobile device vulnerabilities?

Malware

Phishing

Weak passwords

All are correct

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is safe to access untrusted content on a mobile device without using a VPN.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?