Definition

Quiz: Mobile Device Security -- Who else can hear me now?

Mobile device security and compliance regulations can be as hard to pin down as a strong connection for your smartphone. Test your knowledge of risk areas and compliance rules in this quiz.

1. True or False: Every month, more than 13 million mobile phones are left in taxis in large cities throughout the U.S. and Europe.
Answer

2. This is the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive, iPhone, iPod or other MP3 player. What is it?
Answer

3. This client/server protocol and software enables communication between remote and central servers for authentication and authorization of dial-in users. What is it?
Answer

4. Which wireless protocol is more secure, Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA)?
Answer

5. You can create an isolated wireless network by adding a different SSID to an access point as a simple way to improve security. What does SSID stand for?
Answer

6. Allowing workers to connect to an organization's servers using a wireless network introduces a host of risks. Most security experts recommend the use of a mobile ______, a network configuration in which mobile devices access an intranet securely while moving from one physical location to another. What is it?
Answer

7. True or False: If you don't protect the financial data used in commercial transactions on mobile devices, you could be subject to a $10,000 fine.
Answer

8. If a mobile device is lost, mobile compliance regulations may require that a company demonstrate that:
A) The device was encrypted
B) The device never accessed a customer records database
C) Both
Answer

9. A _______ portal can be used to redirect all requests from unknown clients on a wireless network to a special Web page where users must authenticate themselves with valid credentials before they gain access to the Internet. What is it?
Answer

10. True or False: When you work for a privately held company, your mobile device policies must comply with Sarbanes-Oxley (SOX) regulations.
Answer

Did you like this quiz? Try another wireless and mobile quiz or security quiz.



This was last updated in April 2008
Posted by: Margaret Rouse

Email Alerts

Register now to receive SearchMobileComputing.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More News and Tutorials

  • Mobile device security demands surpass reality, survey says

    It's no surprise that mobile device security was top of mind in our recent reader survey. Find out what's missing and what IT pros are asking for in mobile security products.

  • Fingerprint recognition and mobile security

    Fingerprint recognition technology for mobile devices is posed to become the preferred user authentication solution mobile device security. In this Technical Note from the Farpoint Group, you'll see why Fingerprint recognition is likely to become the methodology of choice for all aspects of mobile security across a broad range of applications and usage scenarios.

  • Traditional security threats coming soon to mobile device near you

    Browser exploits, botnets and more will soon be coming to mobile devices, according to a report from the Georgia Tech Information Security Center. Knowing the key threats can help ward off the greatest dangers.

Do you have something to add to this definition? Let us know.

Send your comments to techterms@whatis.com

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: