0% found this document useful (0 votes)
67 views1 page

Mobile Security: Question and Answer Format Name: Date: Grade: Course & Section: Topic

This document contains 10 questions in a question and answer format for a mobile security exam. The questions cover topics such as components of information security, symmetric key algorithms, features of the Symbian OS, multifactor security and how it's achieved in mobile environments, public key cryptography algorithms, components of information security and their features, mobile VPNs, types of attacks in information security, and a comparison of symmetric and public key cryptography.

Uploaded by

Rodjean Simballa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views1 page

Mobile Security: Question and Answer Format Name: Date: Grade: Course & Section: Topic

This document contains 10 questions in a question and answer format for a mobile security exam. The questions cover topics such as components of information security, symmetric key algorithms, features of the Symbian OS, multifactor security and how it's achieved in mobile environments, public key cryptography algorithms, components of information security and their features, mobile VPNs, types of attacks in information security, and a comparison of symmetric and public key cryptography.

Uploaded by

Rodjean Simballa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Question and Answer Format

Name: Date: Grade:

Course & Section: Topic: Mobile Security

1. Explain components of information security.

2. Explain any one Symmetric key Algorithm

3. Give the features of Symbian OS.

4. What is multifactor security? How it is achieved in mobile Environment?

5. Explain any one public key Cryptography algorithm

6. Describe four component of information security

7. Describe Mobile VPN

8. List four components of information security. State the features of each.

9. Describe various types of attacks in Information Security

10. Compare between symmetric key cryptography with public key cryptography

You might also like