Question
Answered

Question 7 (CO 4) Besides using _____ for authentication purposes,...

Question 7

(CO 4) Besides using _____ for authentication purposes, biometric authentication is very effective.

A.) access controls

B.) passwords and PINs

C.) encryption

D.) a login name

Question 8

(CO 4) All of the following are examples of logical protection mechanisms except for

A.) authentication.

B.) auditing.

C.) access controls.

D.) encryption.

Question 9

(CO 4) _____ specifications doallow for authentication required before two Bluetooth devices can connect, but most devices have a default authentication PIN of 0000 or 1234, and the user rarely changes these codes.

A.) Bluetooth

B.) Data

C.) Security

D.) Desktop

Question 10

(CO 4) Bluetooth discoverability, when turned off, will not prevent you from initiating a connection from yours to another Bluetooth device. It just means that you will have to _____ initiate the connection.

A.) automatically

B.) slowly

C.) carefully

D.) manually

Question 11

(CO 5) The _____ model of mobile security focuses on mobile devices themselves as the root of mobile security problems.

A.) user-centric

B.) data-centric

C.) process-centric

D.) device-centric

Question 12

(CO 5) Through a combination of policy and technology restrictions, the organization may be able to limit mobile devices to only those devices that have proven _____ controls.

A.) voice

B.) security

C.) authentication

D.) quality of service

Answer & Explanation
Verified Solved by verified expert
<p>at, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, da</p> Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet

Unlock full access to Course Hero

Explore over 16 million step-by-step answers from our library

Subscribe to view answer

a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vit

at, ultrices a

sum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec fac

cing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices

ur adipisci

dictum v

ipiscing el

facilisis



molestie

at, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentes

a molestie conseq

ng elit. N

dictum vitae

a. Fusce dui lectus, co



, dictum vi

m ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus ef

ce dui lectus, congue vel l

ec aliquet. Lore

sum dolor sit amet,

ipsum dolor sit am



, dictum vi

iscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lect

ec alique

sum dolor si

acinia pulvinar to

ac, dictum vitae odisudictum vi