Android-Enterprise-Professional


1. Google Recommends Which Of The Following Methods To Securely Manage, Deploy Or Host In-House Company Applications?
  • Sideloading
  • Android admin console
  • Zero Touch Portal
  • Managed Google Play Store

2. Restricting Applications From Communicating Directly To Each Other Is An Example Of What Android Security Principle:
  • Verified Boot
  • Safety Net
  • Application Sandboxing
  • Address Space Layout Randomization (ASLR)

3. The Identity Method That Is Preferred For G-Suite Customers:
  • Managed Google Play Account
  • Managed Google Account
  • EMM Enhanced Account
  • Gmail Account

4. The Following Enrollment Methods Are Supported With Android Enterprise:
  • NFC
  • QR Code
  • Zero-Touch
  • All of the above

5. Using Android Enterprise Versus Device Admin (DA) Is Recommended For All Deployments Going Forward Because:
  • Device Admin API’s have been marked deprecated and will eventually not be supported
  • Device Admin API’s provided an outdated security model and management approach
  • Android Enterprise offers a modern management framework with enterprise APIs and secure app deployment via managed Google Play.

  • All of the above

6. The Android Open Source Software Stack Is Built On:
  • SELinux

7. __________________ Is A Standard For Enterprise Customers To Recognize Android Devices That Perform Against Enterprise-Grade Testing And Integrate With Enterprise-Focused Features. (Fill In The Blank)
  • Android Enterprise Recommended

8. __________________ Ensures Key Generation, Key Import, Signing And Verification Services Are Kept Separate From The OS.
  • Trusted Execution Environment (TEE)

41. Android 8.0+ Includes ___________ To Not Allow Downgrading OS To An Older Less Secure Version Or Patch Level.
  • Rollback prevention

9. ____________ Ensures Keys Created With A Newer OS Cannot Be Used By Older OS Versions.
  • Version binding

10. Using A Pin + Hardware Key To Derive Encryption Keys Is Called ________________.
  • PIN verification process

11. Google Play Protect Includes: ​(Select All That Apply)
  • Real-time malware detection
  • Daily scan of apps on devices
  • Blocking of harmful apps

12. __________________ Ensures Key Generation, Key Import, Signing And Verification Services Are Kept Separate From The OS. ​(Fill In The Blank)
  • Trusted Execution Environment (TEE)

13. Hardware-Backed Security Does Which Of The Following? (Select All That Apply)
  • Mitigates exploitation
  • Prevents brute force attacks
  • Protects the boot process
  • Keeps data safe from physical attacks

14. With Managed Google Play, You Can: (Select All That Apply)
  • Manage and configure apps
  • Host and publish internal apps
  • Distribute and purchase apps

15. ‘Sideloading’ Is The #1 Risk For Introducing Malware And PHAs Onto Your Device.
  • True

16. The Advantages Of Hosting Private Apps On Google Play Include: (Select All That Apply)
  • Easy administration
  • Security
  • Reliability

17. COPE Devices Provide: (Select All That Apply)
  • Flexibility of using full device management with a work profile

18. __________________ Enables Large-Scale Android Deployments Across Multiple Device Makers With No Manual Set Up. (Fill In The Blank)
  • EMM token
  • Zero-touch
  • QR code

19. The Feature That Gives IT Control Over Company Data While Allowing Workers To Keep Their Pictures And Apps Private Is Called:
  • Android profiles
  • Zero-touch
  • Work profile
  • Managed Google Play

20. In Order To Gain User Buy In For Work Profiles, Explain To Users That IT Cannot Monitor ____________ . ​(Select All That Apply)
  • Call logs
  • Personal photos
  • Personal app installs
  • SMS

21. True Or False: During Deployment Planning, Determine Scope Of Testing And Timelines For Different Stages Of The Deployment.
  • True

22. _____________ Establishes Best Practices And Common Requirements For Devices And Services, Backed By A Thorough Testing Process Conducted By Google.
  • Android Enterprise Recommended

23. The Newest Enrollment Method With The Launch Of __________ Is ___________:
  • Android P, Fast Touch
  • Android O, Zero Touch
  • Android N, Easy Scale
  • Android M, Managed Deployment

24. As Users Are The First Line Of Defense Against Any Mobile Threat, EMM’s Can Employ Policies That Can Force:
  • Verified Boot
  • Strong PIN, pattern or password lock
  • Continuous SMS and call monitoring
  • Passphrase to recover lost email accounts

25. ________________ Can Add IMEI Or Serial Numbers To The Zero Touch Portal?
  • End-Users
  • Resellers
  • Resellers and carrier partners
  • Customers

26. Using Android Enterprise Versus Device Admin (DA) Is Recommended For All Deployments Going Forward Because:
  • Device Admin API’s have been marked deprecated and will eventually not be supported
  • Device Admin API’s provided an outdated security model and management approach
  • Android Enterprise offers a modern management framework with enterprise APIs and secure app deployment via managed Google Play.
  • All of the above

27. ___________ Is A Collection Of Google Applications And APIs That Help Support Functionality Across Devices And A Requirement For Android Enterprise.
  • Android Managed Services (AMS)
  • Google Mobile Services (GMS)
  • Android Compatibility Services (ACS)
  • Compatibility Test Suite (CTS)

28. The Identity Method That Is Preferred For G-Suite Customers Is Referred To As:
  • Managed Google Play Account & Gmail
  • Managed Google Account
  • EMM Enhanced Account
  • Gmail

29. To Make Android Even Safer, Google Shares Source Code For Security Fixes Every ______ Days With Partners And Publish Updates For Nexus And Pixel Devices.
  • 30
  • 90
  • 180
  • Dessert release

30. As It Pertains To Shared Device Use Cases, Support For _____________ Was Added In Android Pie (9.0) Kiosk Mode.
  • Work profile
  • Multiple containers
  • Multiple Apps
  • Multiple DPC’s

31. Google Play Protect Scans ___________ Apps That Are Installed Onto A Device:
  • Only Google Play store
  • All
  • Only sideloaded
  • Third party

32. All Android OEM’s That Opt To Use Google Mobile Services (GMS) Must Adhere To A _________ And Successfully Pass ____________.
  • Compatibility Definition Document (CDD), Compatibility Test Suite (CTS)
  • Compatibility Definition Document (CDD), Android Test Suite (ATS)
  • Enterprise Recommended Document (ERD) and Compatibility Test Suite (CTS) Compatibility Definition Document (CDD), Android Device Test (ADT) Compatibility Definition Document (CDD), Android Device Test (ADT)

33. Android Enterprise Recommended Ensures Devices Are Up To Date With Regular Security Patches Delivered Within _________. Android Enterprise Recommended Devices Are Also Guaranteed To Get At Least ______________.
  • 45 days, 2 additional major OS updates
  • 90 days, 1 additional major OS update
  • 60 days, 1 additional major OS update
  • 90 days, 2 additional major OS updates

34. How Many Managed Google Play Accounts Can A Customer Get For Free From Google For Use With Their EMM?
  • As many as needed
  • 5
  • 20
  • 35

35. Please Select The Most Accurate Statement As It Pertains To Managed Google Play Accounts:
  • Managed Google Play accounts are quick and easy to claim and require organizations to register their actual name with Google
  • Managed Google Play accounts are easy to claim but require a 1 week approval period from Google
  • Managed Google Play accounts are quick and easy to attain obfuscated identities that can be claimed for as many users as needed
  • Manage Google Play accounts provide end users with identities that allows them to sign in to Google services such as G-Suite

36. Some Of The Advantages Of Hosting Private Apps On Managed Google Play Are:
  • Application scanning, delta upgrades, free app hosting
  • Security, cross platform application support and competitive pricing
  • Security, easy administration and being able to host apps from any platform
  • Hosting private apps on Google Play is not recommended

37. The Following Enrollment Methods Are Supported With Android Enterprise:
  • NFC
  • QR Code
  • Zero-Touch
  • All of the above

38. Google Recommends Which Of The Following Methods To Securely Manage, Deploy Or Host In-House Company Applications?
  • Sideloading
  • Android admin console
  • Zero Touch Portal
  • Managed Google Play Store

39. Devices With A Work Profile Differentiate Work Apps From Personal Apps By A:
  • Badged hashtag
  • Badged dot
  • Badged star
  • Badged briefcase

40. Restricting Applications From Communicating Directly To Each Other Is An Example Of What Android Security Principle:
  • Verified Boot
  • Safety Net
  • Application Sandboxing
  • Address Space Layout Randomization (ASLR)

41. What Are The Are Two Identities That Can Be Used With Android Enterprise?
  • Managed Google Play Account & Gmail
  • Gmail & Managed Google Account
  • Managed Google Account & Managed Google Play Account
  • Managed EMM Account

42. What Is The Proper Method A User Should Follow In Order To Add A Work Profile To Their Personal Device?
  • Clear all personal data from device, download EMM app from Play Store, follow the setup wizard to complete.
  • Download EMM app from Google Play, enter corporate credentials, follow the setup wizard to complete.
  • Hard reset the device, send it into IT department for set up, retrieve device when ready.
  • Enroll device in Zero Touch portal, inform IT so they can configure, follow the setup wizard.

43. Before Deploying Android In A No Connectivity Environment, You Should Strongly Consider:
  • Android Enterprise devices must be able to access the Managed Google Play store to get apps and updates, and Google Play Protect security services.
  • Android Enterprise devices require special permissions and policies to run in such environments
  • The devices running in these environments must be running Android Oreo (8.0) or higher
  • None of the above

44. Android Devices Utilize A __________, To Run Privileged Or Security-Sensitive Operations Such As PIN Verification, Secure Storage Of Encryption Keys And Verified Boot.
  • Tamper Resistant Zone
  • Trusted Execution Environment
  • Trusted Encryption Zone
  • Secure Execution Environment

45. During The ____________ Process, Each Bootstage Cryptographically Verifies The Integrity And Authenticity Of The Next Stage Before Executing It.
  • Verified Boot
  • Kernel checking
  • Hashtagging
  • System check

46. When Enrolling Devices Using The NFC Method, Organizations Can Use __________ To Transfer Configurations To A New Device:
  • Either a pre-programmed master device or NFC tag
  • A pre-programmed master device
  • Only a pre-programmed NFC tag
  • Android Enterprise does not support NFC enrollment

47. Managed Google Play Provides Organizations Complete Control Over App Visibility And Distribution By:
  • Allowing whitelisting and silent app push
  • Providing application user data to admins
  • Easy sideloading of select apps
  • Making full Google Play store available to all user



Search This Blog

Archive

Powered by Blogger.

Popular Posts

Ads 300 x 250

Copyrights Notes

Copyright © 2020 Online Exam Answers. Powered by GlobeOnDesk