1. Google Recommends Which Of The
Following Methods To Securely Manage, Deploy Or Host In-House Company
Applications?
- Sideloading
- Android admin console
- Zero Touch Portal
- Managed Google Play Store
2. Restricting Applications From
Communicating Directly To Each Other Is An Example Of What Android Security
Principle:
- Verified Boot
- Safety Net
- Application Sandboxing
- Address Space Layout Randomization (ASLR)
3. The Identity Method That Is Preferred
For G-Suite Customers:
- Managed Google Play Account
- Managed Google Account
- EMM Enhanced Account
- Gmail Account
4. The Following Enrollment Methods Are
Supported With Android Enterprise:
- NFC
- QR Code
- Zero-Touch
- All of the above
5. Using Android Enterprise Versus Device
Admin (DA) Is Recommended For All Deployments Going Forward Because:
- Device Admin API’s have been marked deprecated and will eventually not be supported
- Device Admin API’s provided an outdated security model and management approach
- Android Enterprise offers a modern management framework with enterprise APIs and secure app deployment via managed Google Play.
- All of the above
6. The Android Open Source Software Stack
Is Built On:
- SELinux
7. __________________ Is A Standard For
Enterprise Customers To Recognize Android Devices That Perform Against
Enterprise-Grade Testing And Integrate With Enterprise-Focused Features. (Fill
In The Blank)
- Android Enterprise Recommended
8. __________________ Ensures Key
Generation, Key Import, Signing And Verification Services Are Kept Separate
From The OS.
- Trusted Execution Environment (TEE)
41. Android 8.0+ Includes ___________ To
Not Allow Downgrading OS To An Older Less Secure Version Or Patch Level.
- Rollback prevention
9. ____________ Ensures Keys Created With
A Newer OS Cannot Be Used By Older OS Versions.
- Version binding
10. Using A Pin + Hardware Key To Derive
Encryption Keys Is Called ________________.
- PIN verification process
11. Google Play Protect Includes: (Select
All That Apply)
- Real-time malware detection
- Daily scan of apps on devices
- Blocking of harmful apps
12. __________________ Ensures Key
Generation, Key Import, Signing And Verification Services Are Kept Separate
From The OS. (Fill In The Blank)
- Trusted Execution Environment (TEE)
13. Hardware-Backed Security Does Which Of
The Following? (Select All That Apply)
- Mitigates exploitation
- Prevents brute force attacks
- Protects the boot process
- Keeps data safe from physical attacks
14. With Managed Google Play, You Can:
(Select All That Apply)
- Manage and configure apps
- Host and publish internal apps
- Distribute and purchase apps
15. ‘Sideloading’ Is The #1 Risk For
Introducing Malware And PHAs Onto Your Device.
- True
16. The Advantages Of Hosting Private Apps On Google Play
Include: (Select All That Apply)
- Easy administration
- Security
- Reliability
17. COPE Devices Provide: (Select All That
Apply)
- Flexibility of using full device management with a work profile
18. __________________ Enables Large-Scale
Android Deployments Across Multiple Device Makers With No Manual Set Up. (Fill
In The Blank)
- EMM token
- Zero-touch
- QR code
19. The Feature That Gives IT Control Over
Company Data While Allowing Workers To Keep Their Pictures And Apps Private Is
Called:
- Android profiles
- Zero-touch
- Work profile
- Managed Google Play
20. In Order To Gain User Buy In For Work Profiles,
Explain To Users That IT Cannot Monitor ____________ . (Select All That Apply)
- Call logs
- Personal photos
- Personal app installs
- SMS
21. True Or False: During Deployment
Planning, Determine Scope Of Testing And Timelines For Different Stages Of The
Deployment.
- True
22. _____________ Establishes Best
Practices And Common Requirements For Devices And Services, Backed By A
Thorough Testing Process Conducted By Google.
- Android Enterprise Recommended
23. The Newest Enrollment Method With The
Launch Of __________ Is ___________:
- Android P, Fast Touch
- Android O, Zero Touch
- Android N, Easy Scale
- Android M, Managed Deployment
24. As Users Are The First Line Of Defense
Against Any Mobile Threat, EMM’s Can Employ Policies That Can Force:
- Verified Boot
- Strong PIN, pattern or password lock
- Continuous SMS and call monitoring
- Passphrase to recover lost email accounts
25. ________________ Can Add IMEI Or
Serial Numbers To The Zero Touch Portal?
- End-Users
- Resellers
- Resellers and carrier partners
- Customers
26. Using Android Enterprise Versus Device
Admin (DA) Is Recommended For All Deployments Going Forward Because:
- Device Admin API’s have been marked deprecated and will eventually not be supported
- Device Admin API’s provided an outdated security model and management approach
- Android Enterprise offers a modern management framework with enterprise APIs and secure app deployment via managed Google Play.
- All of the above
27. ___________ Is A Collection Of Google
Applications And APIs That Help Support Functionality Across Devices And A
Requirement For Android Enterprise.
- Android Managed Services (AMS)
- Google Mobile Services (GMS)
- Android Compatibility Services (ACS)
- Compatibility Test Suite (CTS)
28. The Identity Method That Is Preferred
For G-Suite Customers Is Referred To As:
- Managed Google Play Account & Gmail
- Managed Google Account
- EMM Enhanced Account
- Gmail
29. To Make Android Even Safer, Google
Shares Source Code For Security Fixes Every ______ Days With Partners And
Publish Updates For Nexus And Pixel Devices.
- 30
- 90
- 180
- Dessert release
30. As It Pertains To Shared Device Use
Cases, Support For _____________ Was Added In Android Pie (9.0) Kiosk Mode.
- Work profile
- Multiple containers
- Multiple Apps
- Multiple DPC’s
31. Google Play Protect Scans ___________
Apps That Are Installed Onto A Device:
- Only Google Play store
- All
- Only sideloaded
- Third party
32. All Android OEM’s That Opt To Use
Google Mobile Services (GMS) Must Adhere To A _________ And Successfully Pass
____________.
- Compatibility Definition Document (CDD), Compatibility Test Suite (CTS)
- Compatibility Definition Document (CDD), Android Test Suite (ATS)
- Enterprise Recommended Document (ERD) and Compatibility Test Suite (CTS) Compatibility Definition Document (CDD), Android Device Test (ADT) Compatibility Definition Document (CDD), Android Device Test (ADT)
33. Android Enterprise Recommended Ensures
Devices Are Up To Date With Regular Security Patches Delivered Within
_________. Android Enterprise Recommended Devices Are Also Guaranteed To Get At
Least ______________.
- 45 days, 2 additional major OS updates
- 90 days, 1 additional major OS update
- 60 days, 1 additional major OS update
- 90 days, 2 additional major OS updates
34. How Many Managed Google Play Accounts
Can A Customer Get For Free From Google For Use With Their EMM?
- As many as needed
- 5
- 20
- 35
35. Please Select The Most Accurate
Statement As It Pertains To Managed Google Play Accounts:
- Managed Google Play accounts are quick and easy to claim and require organizations to register their actual name with Google
- Managed Google Play accounts are easy to claim but require a 1 week approval period from Google
- Managed Google Play accounts are quick and easy to attain obfuscated identities that can be claimed for as many users as needed
- Manage Google Play accounts provide end users with identities that allows them to sign in to Google services such as G-Suite
36. Some Of The Advantages Of Hosting
Private Apps On Managed Google Play Are:
- Application scanning, delta upgrades, free app hosting
- Security, cross platform application support and competitive pricing
- Security, easy administration and being able to host apps from any platform
- Hosting private apps on Google Play is not recommended
37. The Following Enrollment Methods Are
Supported With Android Enterprise:
- NFC
- QR Code
- Zero-Touch
- All of the above
38. Google Recommends Which Of The
Following Methods To Securely Manage, Deploy Or Host In-House Company
Applications?
- Sideloading
- Android admin console
- Zero Touch Portal
- Managed Google Play Store
39. Devices With A Work Profile
Differentiate Work Apps From Personal Apps By A:
- Badged hashtag
- Badged dot
- Badged star
- Badged briefcase
40. Restricting Applications From
Communicating Directly To Each Other Is An Example Of What Android Security
Principle:
- Verified Boot
- Safety Net
- Application Sandboxing
- Address Space Layout Randomization (ASLR)
41. What Are The Are Two Identities That
Can Be Used With Android Enterprise?
- Managed Google Play Account & Gmail
- Gmail & Managed Google Account
- Managed Google Account & Managed Google Play Account
- Managed EMM Account
42. What Is The Proper Method A User
Should Follow In Order To Add A Work Profile To Their Personal Device?
- Clear all personal data from device, download EMM app from Play Store, follow the setup wizard to complete.
- Download EMM app from Google Play, enter corporate credentials, follow the setup wizard to complete.
- Hard reset the device, send it into IT department for set up, retrieve device when ready.
- Enroll device in Zero Touch portal, inform IT so they can configure, follow the setup wizard.
43. Before Deploying Android In A No
Connectivity Environment, You Should Strongly Consider:
- Android Enterprise devices must be able to access the Managed Google Play store to get apps and updates, and Google Play Protect security services.
- Android Enterprise devices require special permissions and policies to run in such environments
- The devices running in these environments must be running Android Oreo (8.0) or higher
- None of the above
44. Android Devices Utilize A __________,
To Run Privileged Or Security-Sensitive Operations Such As PIN Verification,
Secure Storage Of Encryption Keys And Verified Boot.
- Tamper Resistant Zone
- Trusted Execution Environment
- Trusted Encryption Zone
- Secure Execution Environment
45. During The ____________ Process, Each
Bootstage Cryptographically Verifies The Integrity And Authenticity Of The Next
Stage Before Executing It.
- Verified Boot
- Kernel checking
- Hashtagging
- System check
46. When Enrolling Devices Using The NFC
Method, Organizations Can Use __________ To Transfer Configurations To A New
Device:
- Either a pre-programmed master device or NFC tag
- A pre-programmed master device
- Only a pre-programmed NFC tag
- Android Enterprise does not support NFC enrollment
47. Managed Google Play Provides
Organizations Complete Control Over App Visibility And Distribution By:
- Allowing whitelisting and silent app push
- Providing application user data to admins
- Easy sideloading of select apps
- Making full Google Play store available to all user