Skip to main content

Posts

Mobile Endpoint Protection Knowledge Check

  Mobile Endpoint Protection Knowledge Check 1 . Question 1 Which mobile operating system runs the majority of smartphones today? 1 / 1  point Android Blackberry Windows iOS Correct Correct! 2 . Question 2 Which mobile operating system runs approximately 60% of tablet computers worldwide? 1 / 1  point Android Blackberry iOS Windows Correct Correct! 3 . Question 3 True or False. Security is enhanced on iOS mobile devices because users typically cannot interact directly with the operating system. 1 / 1  point True False Correct Correct! 4 . Question 4 Which statement best describes the use of anti-virus software on mobile devices? 0 / 1  point Antivirus software can "see" the apps that are running on a mobile device but cannot see the data that is associated with each app. Antivirus software is very effective on mobile devices because it can inspect the data that is associated with each app that is running. Mobile devices provide native security that makes additional anti-virus

Data Security and Protection Knowledge Check

  Data Security and Protection Knowledge Check 1 . Question 1 A student's grades should be visible to that student when she logs in to her university account. Her ability to see her grades is an example of which aspect of the CIA Triad? 1 / 1  point Integrity Authorization Availability Confidentiality Correct Correct! 2 . Question 2 A university has implemented practices that ensure all student data are encrypted while stored on university servers. Which aspect of the CIA Triad does this practice support? 1 / 1  point Confidentiality Authorization Integrity Availability Correct Correct! 3 . Question 3 The Student Portal of a university issues a confirmation code with a hash value each time a student submits an assignment using the portal. This is an example of which aspect of the CIA Triad? 1 / 1  point Confidentiality Authorization Availability Integrity Correct Correct! 4 . Question 4 True or False. An organization has "air gapped" its small network of critical data ser