Mobile Security Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Informationsecur
I
Informationsecur
Community Contributor
Quizzes Created: 2 | Total Attempts: 10,029
Questions: 10 | Attempts: 1,474

SettingsSettingsSettings
Internet Security Quizzes & Trivia

Questions and Answers
  • 1. 

    When traveling for business:

    • A.

      Take only what you need in terms of mobile devices and files.

    • B.

      Keep all of your files on your laptop

    Correct Answer
    A. Take only what you need in terms of mobile devices and files.
    Explanation
    Any mobile devices you carry with you when traveling, and any information stored on them, is at risk of being lost or stolen.

    Rate this question:

  • 2. 

    When talking on the phone in a public place:

    • A.

      Avoid discussing confidential business matters where you can be overheard.

    • B.

      Speak loudly so you can be heard over the noise.

    Correct Answer
    A. Avoid discussing confidential business matters where you can be overheard.
    Explanation
    Be aware of your surroundings. Do not discuss confidential business information where you can be overheard, such as in a reception area, an elevator or a restaurant.

    Rate this question:

  • 3. 

    If you use a public computer, before leaving you should:

    • A.

      Log out of your VPN session

    • B.

      Delete any confidential files you downloaded, and empty the recycle bin

    • C.

      Clear the browser history and close the browser

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    If you do not take these steps, the next person who uses the computer might be able to access confidential information.

    Rate this question:

  • 4. 

    It is not necessary to encrypt confidential files on a mobile computing device.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Mobile devices are easily lost or stolen, so it is important to protect any sensitive files by encrypting them.

    Rate this question:

  • 5. 

    Bluetooth devices may be set to Security Mode 1 by the manufacturer.  This setting does not provide any security.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Security Mode 1 allows anyone within range (10 meters for most devices) to connect to your device. Transmissions are not encrypted, so others can spy on you. You must change to a higher security mode to prevent unauthorized access or eavesdropping.

    Rate this question:

  • 6. 

    An "evil twin" is a wireless network set up by a hacker. It is disguised as a legitimate network, to trick you into logging in.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The evil twin may have the same name as a legitimate network, such as a hotel's wireless network. Once you log in, the hacker may be able to capture information you send over the network.

    Rate this question:

  • 7. 

    If your laptop has wireless networking, you should keep it enabled all the time so you can quickly connect to any available wireless networks.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Disable wireless networking when you are not using it, to prevent unintended connections to wireless networks. NEVER leave wireless networking enabled when you are connected to your organization's wired LAN. This could allow an attacker to "bridge" from a wireless network into your LAN network.

    Rate this question:

  • 8. 

    If you have to leave your computer in a car, you should put it:

    • A.

      In the trunk

    • B.

      On the front seat

    • C.

      On the floor

    Correct Answer
    A. In the trunk
    Explanation
    The safest place to leave your computer is in the trunk, where it cannot be seen.

    Rate this question:

  • 9. 

    Which of these mobile devices should be protected with a password?

    • A.

      Flash Drive

    • B.

      Laptop

    • C.

      PDA

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    All of these should be protected with a password.

    Rate this question:

  • 10. 

    How can you prevent the theft of your laptop?

    • A.

      When in use, secure it with a locking cable.

    • B.

      When storing it, put it in a locked drawer.

    • C.

      When travelling, keep it with you until it can be locked up safely.

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Laptop theft is a common and very serious security problem. Take great care to protect your laptop, especially outside the office.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2010
    Quiz Created by
    Informationsecur
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.