Mobile OS vulnerabilities are typically used to perform jailbreaking of devices.
True
Windows Phone encrypts both apps and user content (e.g.
... [Show More] pictures) on the SD card.
False
Which of the following are attacks against Near Field Communications (NFC)?
All of the above
What two components of a Windows Phone ensure integrity of the boot process?
UEFI & TPM
Depending on the class, Bluetooth devices are capable of transmitting up to 1000 feet.
False
Which of the following is not used to transmit data?
AMPS - Advanced Mobile Phone System
Social Media can be of no useful service for businesses.
False
All four of the latest versions of the major mobile operating systems have a remote wipe capability.
True
Which of the following is not a Bluetooth threat?
Bluejamming
Which of the following is not a type of Phishing?
Blishing - Bluetooth Phishing
When analyzing a device image, only a copy of the original should be used.
True
Website usernames and passwords are always encrypted.
False
Ad Hoc networks contain access points and infrastructure networks are peer to peer.
False
Which of the following does not support S/MIME by default?
Android
Security Set Identifiers (SSID)s can be turned off so that all devices will be unable to detect them.
False
What document should provide guidance to employees on use of social media?
Code of Conduct
Windows SmartScreen Filter increases the resolution on Windows Phones.
False
When investigating a mobile device, after determining the device is safe to handle, network connectivity should be disabled to avoid:
The owner performing a remote wipe
What are the design objectives for 4G LTE?
All of the above
Wiped iPhones can still receive iMessages.
True
Which of the following is an encryption standard for 802.11 networks using IEEE 802.1X authentication?
802.11i
OMB mandates which of the following?
Encryption of sensitive date on mobile devices
Forensic tools typically access device data by taking advantage of a mobile OS vulnerability.
False [Show Less]