Quiz: Essential practices for securing mobile devices

A five-question multiple-choice quiz to test your understanding of the content presented in the Essential practices for securing mobile devices lesson of SearchSecurity.com's Messaging Security School.

SearchSecurity.com Security School



Take this five-question quiz to test your understanding of securing mobile devices in the enterprise.

1. By default, Bluetooth devices operate in which security mode?

  1. Mode 1; "non-secure" mode
  2. Mode 2; leaving security up to each application.
  3. Mode 3; enforce link encryption for all traffic.
  4. Mode 4; security settings default to a mobile policy server.

2. Which one of the following responses is not a recommended way to avoid being victimized by malicious Trojans targeting Symbian-based devices?

  1. Ensure users upgrade their devices every 12 months.
  2. Keep firmware and OS versions up to date.
  3. Use mobile antispyware and antivirus software.
  4. Install only Symbian-signed programs or programs from a trusted source.

3. Which of the following is not a Bluetooth attack vector?

  1. BlueBuging, which lets an attacker make calls on another Bluetooth phone.
  2. BlueJacking, which lets an attacker add contacts to a Bluetooth device's phonebook.
  3. BlueScolding, which lets an attacker trigger program crashes on a Bluetooth device.
  4. BlueSmacking, which crashes a Bluetooth device by sending a "ping-of-death" message.
  5. None of the above.

4. Windows Mobile applications can now be digitally signed. What's the advantage of this feature for enterprise security?

  1. To prevent applications from leaking unauthorized data.
  2. To keep users from altering device application settings.
  3. To help users distinguish between legitimate programs and malware.
  4. To enable applications to send log data back to administators.
  5. To assist developers in creating secure mobile Web services with SOAP and WSDL.

5. Why is it critical for enterprises to assess the business risk of using mobile devices?

  1. Enabling mobile device features without evaluating the pros/cons can be risky.
  2. Such an evaluation always enables an enterprise to reduce its mobile device risks.
  3. To determine which devices interact with sensitive data.
  4. Both A and B.
  5. Both A and C.

If you answered two or more questions incorrectly, revisit the materials from the Essential practices for securing mobile devices lesson:

  • Tip: Taking the bite out of Bluetooth
  • Podcast: Platform Protection: Security issues for mobile devices
  • Webcast: Top 5 ways to lock down your mobile devices

    If you answered four or more questions correctly, return to SearchSecurity.com's Messaging Security School and begin your next lesson.

  • This was first published in October 2006

    Dig deeper on Handheld and Mobile Device Security Best Practices

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close