Android Enterprise Professional
- Some of the advantages of hosting private apps on Managed Google Play are:
- Using a pin + hardware key to derive encryption keys is called _____.
- Using Android Enterprise versus Device Admin (DA) is recommended for all deployments going forward because:
- To make Android even safer, Google shares source code for security fixes every ___ days with partners and publish updates for Nexus and Pixel devices.
- ‘Sideloading’ is the #1 risk for introducing malware and PHAs onto your device.
- What is the proper method a user should follow in order to add a work profile to their personal device?
- Please select the most accurate statement as it pertains to Managed Google Play accounts:
- _____ ensures key generation, key import, signing and verification services are kept separate from the OS. (fill in the blank)
- The Android open source software stack is built on:
- Google Play Protect includes: (select all that apply)
- _____ is a standard for enterprise customers to recognize Android devices that perform against enterprise-grade testing and integrate with enterprise-focused features. (fill in the blank)
- COPE devices provide: (select all that apply)
- Devices with a work profile differentiate work apps from personal apps by a:
- As it pertains to shared device use cases, support for _____ was added in Android Pie (9.0) kiosk mode.
- _____ establishes best practices and common requirements for devices and services, backed by a thorough testing process conducted by Google.
- The advantages of hosting private apps on Google Play include: (select all that apply)
- _____ ensures keys created with a newer OS cannot be used by older OS versions.
- Managed Google Play provides organizations complete control over app visibility and distribution by:
- Android 8.0+ includes _____ to not allow downgrading OS to an older less secure version or patch level.
- During the _____ process, each bootstage cryptographically verifies the integrity and authenticity of the next stage before executing it.
- Google recommends which of the following methods to securely manage, deploy or host in-house company applications?
- In order to gain user buy in for work profiles, explain to users that IT cannot monitor _____ . (select all that apply)
- What are the are two identities that can be used with Android Enterprise?
- _____ can add IMEI or serial numbers to the Zero Touch portal?
- As users are the first line of defense against any mobile threat, EMM’s can employ policies that can force:
- Hardware-backed security does which of the following? (select all that apply)
- The identity method that is preferred for G-Suite customers is referred to as:
- Restricting applications from communicating directly to each other is an example of what Android security principle:
- _____ is a collection of Google applications and APIs that help support functionality across devices and a requirement for Android Enterprise.
- When enrolling devices using the NFC method, organizations can use _____ to transfer configurations to a new device:
- Before deploying Android in a no connectivity environment, you should strongly consider:
- The identity method that is preferred for G-Suite customers:
- All Android OEM’s that opt to use Google Mobile Services (GMS) must adhere to a _____ and successfully pass _____.
- Android Enterprise Recommended ensures devices are up to date with regular security patches delivered within _____. Android Enterprise Recommended devices are also guaranteed to get at least _____.
- Android devices utilize a _____, to run privileged or security-sensitive operations such as PIN verification, secure storage of encryption keys and Verified Boot.
- Google Play Protect scans _____ apps that are installed onto a device:
- The newest enrollment method with the launch of _____ is _____:
- True or false: During deployment planning, determine scope of testing and timelines for different stages of the deployment.
- How many Managed Google Play accounts can a customer get for free from Google for use with their EMM?
- The following enrollment methods are supported with Android Enterprise:
- _____ ensures key generation, key import, signing and verification services are kept separate from the OS.