Messaging Security School

Quiz: Essential practices for securing mobile devices

SearchSecurity.com Security School



Take this five-question quiz to test your understanding of securing mobile devices in the enterprise.

1. By default, Bluetooth devices operate in which security mode?

  1. Mode 1; "non-secure" mode
  2. Mode 2; leaving security up to each application.
  3. Mode 3; enforce link encryption for all traffic.
  4. Mode 4; security settings default to a mobile policy server.

2. Which one of the following responses is not a recommended way to avoid being victimized by malicious Trojans targeting Symbian-based devices?

  1. Ensure users upgrade their devices every 12 months.
  2. Keep firmware and OS versions up to date.
  3. Use mobile antispyware and antivirus software.
  4. Install only Symbian-signed programs or programs from a trusted source.

3. Which of the following is not a Bluetooth attack vector?

  1. BlueBuging, which lets an attacker make calls on another Bluetooth phone.
  2. BlueJacking, which lets an attacker add contacts to a Bluetooth device's phonebook.
  3. BlueScolding, which lets an attacker trigger program crashes on a Bluetooth device.
  4. BlueSmacking, which crashes a Bluetooth device by sending a "ping-of-death" message.
  5. None of the above.

4. Windows Mobile applications can now be digitally signed. What's the advantage of this feature for enterprise security?

  1. To prevent applications from leaking unauthorized data.
  2. To keep users from altering device application settings.
  3. To help users distinguish between legitimate programs and malware.
  4. To enable applications to send log data back to administators.
  5. To assist developers in creating secure mobile Web services with SOAP and WSDL.

5. Why is it critical for enterprises to assess the business risk of using mobile devices?

  1. Enabling mobile device features without evaluating the pros/cons can be risky.
  2. Such an evaluation always enables an enterprise to reduce its mobile device risks.
  3. To determine which devices interact with sensitive data.
  4. Both A and B.
  5. Both A and C.

If you answered two or more questions incorrectly, revisit the materials from the Essential practices for securing mobile devices lesson:

  • Tip: Taking the bite out of Bluetooth
  • Podcast: Platform Protection: Security issues for mobile devices
  • Webcast: Top 5 ways to lock down your mobile devices

    If you answered four or more questions correctly, return to SearchSecurity.com's Messaging Security School and begin your next lesson.

    This was first published in October 2006

  • There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: