10.5.8 Practice Questions Flashcards

1
Q

Question 1.
A software technician presents a forum on sideloading and jailbreaking to a group of new mobile users.
Which of the following points will the technician include in their discussion of the use of jailbreaking? (Select two.)

answer
It provides the ability to share internet connectivity to other devices.
It is a method used to gain elevated privileges and access to system files on mobile devices.
It refers to the installation of applications from sources other than the official application store of the platform.
It allows users t.o install unauthorized applications and customize device appearance and behavior
It does not undergo the same scrutiny and vetting process as those on official application stores.

A

Correct Answer:
It is a method used to gain elevated privileges and access to system files on mobile devices.

Correct Answer:
It allows users t.o install unauthorized applications and customize device appearance and behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question 2.
Which of the following mobile device security considerations disables the ability to use the device after a short period of inactivity?

answer
TPM
GPS
Screen lock
Remote wipe

A

Correct Answer:
Screen lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question 3.
A cyber team presents a discussion on the use of sideloading and jailbreaking to a group of board members.
Which of the following BEST describes sideloading? (Select two.)

answer
It provides the ability to share internet connectivity to other devices.
It is a method used to gain elevated privileges and access to system files on mobile devices.
It allows users to install unauthorized applications and customize device appearance and behavior.
It does not undergo the same scrutiny and vetting process as those on official application stores.
It refers to the installation of applications from sources other than the official application store of the platform.

A

Correct Answer:
It does not undergo the same scrutiny and vetting process as those on official application stores.

Correct Answer:
It refers to the installation of applications from sources other than the official application store of the platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question 4.
An IT security specialist at a mid-size corporation observes a trend of unauthorized apps appearing on company-provided mobile devices. The specialist suspects the employees are either sideloading apps or have jailbroken their devices.
What steps should the security specialist take to verify the cause of the unauthorized applications and to re-establish proper security protocols? (Select two.)

answer
Implement mobile device management (MDM) policies to restrict unauthorized application installation.
Conduct device audits to identify unauthorized applications and to detect any signs of jailbreaking or sideloading.
Hire external IT consultants to manage mobile device usage.
Purchase new mobile devices to replace all current ones.
Implement a credential management policy.

A

Correct Answer:
Implement mobile device management (MDM) policies to restrict unauthorized application installation.

Correct Answer:
Conduct device audits to identify unauthorized applications and to detect any signs of jailbreaking or sideloading.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question 5.
A smartphone was lost at the airport. There is no way to recover the device.
Which of the following ensures data confidentiality on the device?

answer
GPS
TPM
Screen lock
Remote wipe

A

Correct Answer:
Remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question 6.
Which of the following is the recommend Intune configuration?

answer
Company portal
Hybrid MDM
Account portal:
Intune Standalone

A

Correct Answer:
Intune Standalone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question 7.
Which of the following is a solution that pushes security policies directly to mobile devices over a network connection?

answer
Application Control
Credential Manager
Group Policy
Mobile device management (MDM)

A

Correct Answer:
Mobile device management (MDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question 8.
The IT team of a medium-sized company plans to implement a mobile device management (MDM) solution to enhance security and streamline the management of its growing number of mobile devices.
The company has employees who use various devices, such as smartphones and tablets, for work tasks in and out of the office.
The IT team needs to choose the MOST appropriate deployment model for their MDM solution to ensure seamless device management and data protection.
Which deployment model for MDM provides the highest level of control and security for the company’s diverse mobile devices?

answer
On-premises deployment with limited network access
Incorrect answer:
Bring your own device (BYOD) deployment with partial control
Hybrid deployment with minimal cloud integration
Cloud-based deployment

A

Correct Answer:
Cloud-based deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question 9.
The IT manager has tasked you with configuring Intune. You have enrolled the devices and now need to set up the Intune policies.
Where would you go to set up the Intune policies?

answer
-In the Admin portal, select Management > Policy > Add Policy.
-In the Company portal, select Management > Policy > Add Policy.
-In the Company portal, select Policy > Add Policy.
-In the Admin portal, select Policy > Add Policy.

A

Correct Answer:
In the Admin portal, select Policy > Add Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question 10.
Your organization recently purchased 20 Android tablets for use by the organization’s management team. You are using a Windows domain.
Which of the following should you use to push security settings to the devices?

answer
Intune
Credential Manager
Application Control
Group Policy

A

Correct Answer:
Intune

How well did you know this?
1
Not at all
2
3
4
5
Perfectly