#1
What is a common method for securing mobile devices?
Enabling biometric authentication
ExplanationBiometric authentication adds an extra layer of security by verifying unique physiological traits.
#2
What does the term 'phishing' refer to in the context of mobile security?
Attempting to deceive users into revealing sensitive information
ExplanationPhishing involves fraudulent attempts to obtain sensitive information by posing as a trustworthy entity.
#3
What is the purpose of SSL/TLS encryption in mobile communication?
To secure communication by encrypting data transmission
ExplanationSSL/TLS encryption protects data exchanged between mobile devices and servers by encoding it, thwarting interception attempts.
#4
What is the primary purpose of an Intrusion Detection System (IDS) on a mobile device?
To detect and respond to unauthorized access or malicious activities
ExplanationIDS monitors device activity, identifying and alerting users to suspicious behavior or potential security breaches.
#5
Why is it important to use app whitelisting/blacklisting in mobile security?
To control which apps are allowed or denied on a device for security reasons
ExplanationApp whitelisting/blacklisting restricts app installations to authorized software, reducing the risk of malware or unauthorized access.
#6
Which of the following is a potential security risk on mobile devices?
Jailbreaking or rooting
ExplanationJailbreaking or rooting can expose devices to vulnerabilities by bypassing built-in security measures.
#7
What is the purpose of a VPN (Virtual Private Network) on a mobile device?
To secure internet connections and protect data
ExplanationA VPN encrypts internet traffic, safeguarding it from interception and protecting user data privacy.
#8
Which of the following is a recommended practice to avoid malware on mobile devices?
Using reputable app stores and regularly updating software
ExplanationObtaining apps from trusted sources and keeping software updated minimizes the risk of malware infections.
#9
What is the purpose of remote wipe functionality on a mobile device?
To erase all data on the device in case of loss or theft
ExplanationRemote wipe allows users to remotely delete data from a lost or stolen device to prevent unauthorized access.
#10
Why is it advisable to avoid using public charging stations for mobile devices?
To prevent the risk of data theft or malware installation
ExplanationPublic charging stations may contain compromised USB ports that could steal data or install malware on connected devices.
#11
Why is it important to disable unnecessary app permissions on a mobile device?
To protect personal data and privacy
ExplanationDisabling unnecessary app permissions limits access to personal data, enhancing privacy and security.
#12
What is the significance of two-factor authentication (2FA) in mobile security?
It adds an extra layer of security by requiring a second form of verification
ExplanationTwo-factor authentication enhances security by requiring users to provide two forms of verification.
#13
Why is it important to use a secure Wi-Fi connection on a mobile device?
To protect against unauthorized access and data interception
ExplanationSecuring Wi-Fi connections prevents unauthorized users from intercepting data transmitted between the device and network.
#14
What is a 'sandbox' in the context of mobile app security?
A restricted environment for testing and running applications
ExplanationA sandbox confines apps within a controlled environment, preventing them from accessing system resources outside their designated area.
#15
Why is it important to review and understand app permissions before installing them?
To protect personal privacy and data security
ExplanationUnderstanding and scrutinizing app permissions helps users assess the extent of data access and protect their privacy.