Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO)
Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO).
Which of the following is the function of Geotracking?
Which of the following is the function of Geotracking?
While using a mapping program, which of the following functions shows the user’s location on the map as
While using a mapping program, which of the following functions shows the user’s location on the map as well as movements on the map as they travel?
Which of the following should the technician perform on the iPad?
A user calls a technician to state that the touch portion of their iPad does not type the correct letters that they touch. Which of the following should the technician perform on the iPad?
Which of the following types of mobile security methods is being described?
A customer wants to ensure that if their phone is lost, someone can only try five times to enter the correct password, and then the phone erases all of the data. Which of the following types of mobile security methods is being described?
Which of the following security measures has the technician decided to employ?
A technician has to enter a 4 digit numeric key before they can access the phone. Which of the following security measures has the technician decided to employ?
Which of the following ports and protocols are MOST likely needed to set up email on a mobile device?
Which of the following ports and protocols are MOST likely needed to set up email on a mobile device?
When putting a mobile device into airplane mode, which of the following features is typically disabled? (Selec
When putting a mobile device into airplane mode, which of the following features is typically disabled? (Select TWO).
Which of the following technologies should a technician recommend in order for the user to have access to both
A user would like to run a copy of Windows XP for testing; however, the user is currently using a Windows 7 PC. Which of the following technologies should a technician recommend in order for the user to have access to both systems simultaneously?
Which of the following is the MOST secure method, short of physical destruction, that would be used to ensure
Which of the following is the MOST secure method, short of physical destruction, that would be used to ensure that data on a hard drive cannot be recovered?