#1
Which of the following is a common security measure for portable devices?
Encryption
ExplanationProtects data by encoding it into unreadable format.
#2
What does MDM stand for in the context of portable device security?
Mobile Device Management
ExplanationCentralized control and security management for devices.
#3
What is the purpose of a screen protector on a portable device?
To protect the screen from scratches and cracks
ExplanationPolicy allowing employees to use personal devices for work.
#4
Which of the following is a recommended practice to secure data on a portable device?
Regularly backing up data
ExplanationAdds physical layer of protection against damage.
#5
What does BYOD stand for in the context of portable device security?
Bring Your Own Device
ExplanationEnsures data recovery in case of device loss or damage.
#6
Which of the following is NOT a recommended security practice for portable devices?
Using public Wi-Fi for sensitive transactions
ExplanationIncreases vulnerability to interception and attacks.
#7
What is the purpose of biometric authentication in portable device security?
To verify user's identity based on physical characteristics
ExplanationEnhances security by using unique biological features for authentication.
#8
What is the purpose of a VPN (Virtual Private Network) on a portable device?
To provide secure connection over the internet
ExplanationEncrypts internet traffic to ensure privacy and security.
#9
What is the primary benefit of using sandboxing on portable devices?
Isolating potentially harmful applications
ExplanationPrevents malware from affecting other parts of the system.
#10
What is the purpose of a firewall on a portable device?
To filter network traffic
ExplanationMonitors and controls incoming and outgoing network traffic.
#11
What is the purpose of automatic screen locking on a portable device?
To prevent unauthorized access
ExplanationRequires authentication to unlock device, enhancing security.
#12
Which of the following is a feature of remote wipe capability?
Erasing data from a lost or stolen device remotely
ExplanationPrevents unauthorized access to sensitive information.
#13
What security measure involves restricting access to certain areas of a portable device?
Geofencing
ExplanationDefines geographical boundaries to control device access.
#14
What is the purpose of a hardware token in portable device security?
To provide additional authentication factor
ExplanationGenerates one-time passwords for secure access.
#15
What is the primary purpose of end-to-end encryption on messaging apps for portable devices?
To protect message content from interception
ExplanationEnsures only sender and recipient can read messages, enhancing privacy.
#16
Which of the following is NOT a recommended practice for securing portable devices in public places?
Enabling automatic Wi-Fi connection
ExplanationIncreases risk of connecting to insecure networks.
#17
What is the purpose of jailbreaking or rooting a portable device?
To gain access to restricted system functions
ExplanationAllows customization and installation of unauthorized software.