Trivia Quiz On Wandera’s Secure Mobile Gateway Company!

  • ISO/IEC 27001
  • NIST SP 800-53
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Stijn Paumen
S
Stijn Paumen
Community Contributor
Quizzes Created: 3 | Total Attempts: 8,231
| Attempts: 49 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1. Wandera's threat R&D team publishes regular one-pagers on new mobile threats on Wandera website. What are these called?

Explanation

Wandera's threat R&D team regularly publishes one-pagers on new mobile threats on their website. These one-pagers are called "Threat Advisories."

Submit
Please wait...
About This Quiz
Trivia Quiz On Wanderas Secure Mobile Gateway Company! - Quiz

This test is designed to assess technical knowledge of Wandera's Secure Mobile Gateway solution. The test has 50 questions in total and most of them are multiple choices.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. What is Wandera's unique advantage against competition?

Explanation

Wandera's unique advantage against competition is its multi-level architecture, which allows for deeper and wider visibility into data usage. This means that Wandera can provide more detailed insights and analysis into how data is being used, allowing businesses to better understand and manage their mobile data usage. This advantage sets Wandera apart from its competitors, as it offers a more comprehensive and in-depth solution for monitoring and optimizing data usage.

Submit
3. What is the USP of Wandera solution?

Explanation

The USP of Wandera solution is its ability to provide real-time granular visibility and control of mobile data. This means that users can monitor and manage their mobile data usage in real-time, allowing them to have a detailed understanding of how their data is being used and take necessary actions to optimize it. This feature sets Wandera apart from other solutions as it offers a high level of control and visibility over mobile data usage.

Submit
4. How is data routed via Wandera cloud gateway?

Explanation

As part of Wandera app installation process, a profile is installed on the device which instructs the device to route all web traffic via Wandera cloud gateway. This profile is PIN locked and therefore it can only be removed after obtaining the PIN code from administrator.

Submit
5. What happens when a user is blocked by a Wandera policy?

Explanation

The user can't access specific site or app that is blocked. Block policies are configured on data policy page in RADAR.

Submit
6. What is RADAR ?

Explanation

RADAR is a cloud-based administration portal for authorised administrators to manage Wandera service including common tasks such as add/remove/manage users, define policy settings and real-time granular reporting including data usage, caps, blocks and security

Submit
7. Identify different options for defining data usage costs in plan details.

Explanation

The correct answer is "Cost per MB while roaming on per country basis and monthly cost for domestic usage. Plan details can be defined for multiple carriers." This option includes two different options for defining data usage costs: cost per MB while roaming on a per country basis and monthly cost for domestic usage. Additionally, it states that plan details can be defined for multiple carriers, indicating that the data usage costs can be customized for different carriers.

Submit
8. Is it possible to create different policies based on groups of users or individual users?

Explanation

The correct answer is that it is possible for an administrator to create different policies based on groups of users or individual users. This means that the administrator has the ability to customize policies according to specific user groups or even individual users, allowing for more flexibility and tailored security measures.

Submit
9. What is the standard SLA for availability of Wandera service?
Submit
10. Name key capabilities of Wandera solution to tackle challenges associated with adoption of enterprise mobility?

Explanation

Wandera delivers Threat Prevention, Compliance and Data Cost Management solutions through our cloud gateway architecture.

Submit
11. Is it possible to export data from RADAR?

Explanation

Yes, it is possible to export data from RADAR in CSV format. This means that users can save their data from RADAR in a format that is compatible with spreadsheet software such as Microsoft Excel or Google Sheets. This allows for easy analysis and manipulation of the data outside of the RADAR system.

Submit
12. How does Wandera provide redundancy?

Explanation

Wandera achieves redundancy by utilizing multiple data centers from reputable cloud providers to host its applications and data. This ensures that even if one data center experiences a failure or outage, the services and data can still be accessed from another data center, maintaining availability. The infrastructure is specifically designed to offer 99.99% availability, further enhancing redundancy and ensuring continuous access to Wandera's applications and data.

Submit
13. How does Wandera calculate savings to include in ROI reports?

Explanation

Wandera Data Savings are calculated based on the compression savings and usage policies such as blocks and caps. Savings associated with blocks are calculated using a proprietary algorithm that looks at the average data usage for that destination.

Submit
14. Wandera recently changed its licensing model from vertical functional SKU's titled View, Extend, Secure and EMM Connect to two horizontal bundles. Can you name them?

Explanation

Wandera has two horizontal bundles named Professional which is suitable for small and medium sized organisations and Enterprise which is suitable for large organisations.

Submit
15. XCodeGhost was a vulnerability identified for iOS devices in 2015

Explanation

The statement confirms that xCodeGhost was indeed a vulnerability identified for iOS devices in 2015.

Submit
16. What happens when a roaming user reaches their assigned data allowance? 

Explanation

All cellular web data that passes through Wandera cloud gateway will be blocked - this doesn't include WiFi traffic or non cellular web traffic such as tethering

Submit
17. What are the supported EMM/MDM platforms for EMMC Integration?

Explanation

The correct answer is MobileIron, AirWatch. These two platforms, MobileIron and AirWatch, are supported for EMMC Integration.

Submit
18. Is it possible to configure notifications to be sent out and how are they delivered?

Explanation

The correct answer is that user notifications are sent via in-app push notifications and admin notifications are sent via emails. This means that users will receive notifications directly within the application, while administrators will receive notifications through their email accounts.

Submit
19. Does Wandera have an element of tamper proofing built into the service activation process?

Explanation

The correct answer is that the Wandera profile installed on the device is PIN locked. This means that the user is required to enter a PIN to access and make any changes to the Wandera profile on their device. This provides an additional layer of security and prevents unauthorized tampering with the service activation process.

Submit
20. Which data center providers does Wandera use?

Explanation

Wandera uses a combination of public cloud providers and co-location services including AWS and Rackspace. This means that they utilize the infrastructure and services offered by these providers to host their data centers. By using a mix of public cloud providers and co-location, Wandera can benefit from the scalability and flexibility of the cloud while also having physical control over their data in co-located facilities. This approach allows them to optimize their data centers based on regional needs and leverage the strengths of different providers.

Submit
21. How long does it take for any policy changes made through RADAR to become effective?

Explanation

RADAR is a system that allows for policy changes to be made instantly. Therefore, any changes made through RADAR become effective immediately.

Submit
22. Wandera and EMM/MDM are complementary solutions. True or False?

Explanation

EMM/MDM is all about managing the device and apps while Wandera is focusing on providing real-time visibility and control of mobile data.

Submit
23. During the first half of 2016, Wandera is planning to release an over-the-air deployment capability that is integrated with which MDM?

Explanation

Wandera is planning to release an over-the-air deployment capability that is integrated with AirWatch. This means that Wandera's deployment capability will be compatible and work seamlessly with AirWatch's Mobile Device Management (MDM) system. MDM systems like AirWatch are used to manage and secure mobile devices in an organization, and the integration with Wandera's deployment capability will allow for easier and more efficient deployment of software and updates over the air.

Submit
24. Where should a partner register new leads with Wandera?

Explanation

Partners should register new leads with Wandera through the Wandera partner portal. This portal is specifically designed for partners to manage their leads and access resources related to Wandera's products and services. It provides a centralized platform for partners to input and track their leads, ensuring efficient communication and collaboration between Wandera and its partners.

Submit
25. Which of the following device platforms are supported by Wandera solution? Choose all correct options.

Explanation

Wandera solution currently supports Apple iOS and Samsung Android platforms. Blackberry and Windows Phone 8.x platforms are currently not supported.

Submit
26. How is Wandera service activated on the device? Choose all correct options.

Explanation

To activate the Wandera service on a device, there are two correct options. First, the devices need to be added to the Wandera management portal, either one at a time or through a bulk upload. After that, an invitation email or SMS message is sent to the user, providing them with a list of steps to follow in order to activate the Wandera service. Additionally, the Wandera app can be pushed to the device along with Managed App Config from a supported EMM solution, and the users are requested to run the Wandera app to complete the activation process.

Submit
27. Name two different types of policies defined in RADAR.

Explanation

Data Policy applies to data usage in both domestic and roaming countries and Security Policy applies to specific security threats detected on the device

Submit
28. What is the standard document produced by Wandera on completion of pilot process?

Explanation

The standard document produced by Wandera on completion of the pilot process is the Return Of Investment (ROI) document. This document includes details of the net savings delivered and a security risk assessment. It provides an analysis of the financial benefits and cost savings that the pilot process has achieved, as well as an evaluation of the security risks that have been addressed. This document is important for evaluating the success of the pilot process and determining the value of implementing the Wandera solution.

Submit
29. RADAR allows administrators to define data policies and security policies. What is the enforcement point for these policies?

Explanation

The enforcement point for the policies defined in RADAR is the Wandera cloud gateway. This means that once the policies are created by administrators, they are transferred to the Wandera cloud gateway, which then enforces these policies. The device OS itself does not enforce the policies directly, but rather relies on the Wandera cloud gateway to enforce them.

Submit
30. Identify three different types of Man-in-the-Middle attacks which are detected and remediated by Wandera solution.

Explanation

Wandera supports iOS (iPhones and iPads) and Samsung Android devices (using the Samsung KNOX API) today.
Wandera will soon support Windows Phone devices too.

Submit
31. Which protocols are routed via Wandera cloud gateway? 

Explanation

Only web traffic over ports 80 (HTTP) and 443 (HTTPS) is routed via Wandera cloud gateway. All non-web traffic including VoIP applications, tethering/hotspot and containerised applications do not route via Wandera cloud gateway.

Submit
32. What are the supported EMM/MDM platforms for App Push feature?

Explanation

The supported EMM/MDM platforms for the App Push feature are AirWatch, MobileIron, Citrix XenMobile, and SAP Afaria.

Submit
33. How can administrators use Wandera to measure the severity of threats that impact a device or organization? 

Explanation

RADAR provides visibility to organizations and assists them by identifying and prioritizing detected security events. Wandera applies a severity value to each threat while providing a calculated score of risk for each device and the company as a whole.
Severity of a threat is graded on a score of one to five, with five being the most severe. Our security experts are constantly assessing the risk of threats we detect, applying appropriate severity level to each. Risk is determined based upon a variety of factors, such as the likelihood of a vulnerability being exploited and the impact severity if it were exploited.
Our risk scoring utilizes a proprietary algorithm based upon the severity and quantity of threats detected on a device, resulting in an assigned value to each device between 0 and 100. The higher the risk score, the more at risk that device is and the sooner it should be evaluated. A company wide risk score is derived from all of the organization’s combined risk scores to allow you to assess the overall security posture of the customer's mobile deployment in a single glance.

Submit
34. What is SmartWire Cloud Intelligence?

Explanation

Wandera's proprietary threat detection and correlation engine refers to SmartWire Cloud Intelligence. This engine is developed by Wandera and is used to detect and correlate threats in order to provide security and protection against malware and other mobile threats. It is a specialized technology that analyzes data and identifies potential threats, helping to keep mobile devices and data safe.

Submit
35. Is Wandera App mandatory to running Wandera service?

Explanation

The Wandera App is not mandatory to run the Wandera service. Although it is possible to use the service without the App, having the App on the device enhances visibility and control of mobile data. Therefore, it is strongly recommended to have the App installed for better management of mobile data.

Submit
36. What is the Wandera App used for? 

Explanation

The Wandera App detects the location of the device using the SLC (Significant Location Change) functionality so that a roaming policy can be applied on cloud gateway when a user is out of the country. The App also delivers useful end-user reports on data usage and collects heartbeat information for threat detections and security improvement.

Submit
37. What are the key challenges associated with adoption of enterprise mobility?

Explanation

Mobile devices are always on, often combine personal and business usage on one device and often used in roaming scenarios leading to security risks, business & legal risks and financial risks.

Submit
38. Approximately how many categories does Wandera offer to help manage compliance policies?

Explanation

Wandera offers approximately 20 categories to help manage compliance policies. These categories likely include various aspects of compliance such as data protection, privacy regulations, network security, and content filtering. By providing these categories, Wandera enables organizations to effectively manage and enforce compliance policies across their networks and devices.

Submit
39. What is Semi-Jailbreak and why does it represent high risk?

Explanation

Semi-Jailbreak is a version of Jailbreak that allows users to install side-loaded apps, some of which may contain malware. This poses a high risk because it bypasses the security measures put in place by the device's operating system, making it easier for malicious apps to be installed without detection. As a result, the user's device and personal information are at a greater risk of being compromised.

Submit
40. Where is the data stored and what is the standard data retention period?

Explanation

Data is securely dropped from our datawarehouses after the 12 month period.

Submit
41. Wandera uses a multi-level architecture. Name different points of data entry into Wandera cloud. Choose any three of the following.

Explanation

Wandera multi-level architecture sources data through app on the device, Wandera cloud gateway and EMM connect integration. Wandera therefore has industry's largest mobile dataset which amounts of billions of inputs every day.

Submit
42. During the first half of 2016, Wandera is planning to release Wi-Fi capabilities for which platforms?

Explanation

Wandera is planning to release Wi-Fi capabilities for iOS supervised platforms during the first half of 2016.

Submit
43. What are device 'Heartbeats'?

Explanation

Wandera app collects heuristic data such as configuration files, events and other logs from the device seamlessly and continuously uploads them to the Wandera cloud gateway for processing.

Submit
44. How are mobile threats categorised and secured by Wandera solution? Choose all correct options.

Explanation

The Wandera solution categorizes and secures mobile threats in various categories. Device threats include jailbreaks and semi-jailbreaks, outdated operating systems, malicious profiles, and dangerous certificates. Web threats encompass spam, phishing, malicious websites, and websites that leak sensitive information. App threats include spam, phishing, malicious apps, and apps that leak sensitive information. Infrastructure threats include man-in-the-middle attacks, rogue hotspots, phishing WiFis, and dangerous certificates. The solution also addresses malware threats such as viruses, worms, trojans, rootkits, and backdoors. Spyware threats, such as trackware, are also considered. Lastly, risk-ware threats are identified, which are considered safe when used appropriately but can pose a security risk if misused.

Submit
45. Please identify different options available for trialing Wandera solution. Choose all correct options.

Explanation

The available options for trialing the Wandera solution include a 30-day trial with one portal and 1-5 devices, a 21-day cool off period, and a 45-day pilot with 25-100 devices and a pre-agreed pilot agreement with defined success criteria. These options allow customers to test the solution with different durations, device limits, and success criteria to ensure it meets their needs.

Submit
46. What are the different time intervals for which data policies can be defined?

Explanation

The data policies can be defined for a monthly or daily period. If the data cap is configured for a monthly period then the administrator is required to specifiy the start of the billing cycle.

Submit
47. Select different traffic types that do not route via Wandera cloud gateway. Choose all correct options.

Explanation

Only web traffic over ports 80 (HTTP) and 443 (HTTPS) is routed via Wandera cloud gateway. All non-web traffic including VoIP applications, tethering/hotspot and containerised applications do not route via Wandera cloud gateway.

Submit
48. A key part of Wandera's sales strategy is "land and expand". What share of new revenues does Wandera expect to generate from existing customers this year?

Explanation

Wandera's sales strategy of "land and expand" indicates that they focus on acquiring new customers and then expanding their services within those existing customers. The answer of 1/3 suggests that Wandera expects to generate one-third of their new revenues from existing customers this year. This indicates that they have a strong emphasis on upselling and cross-selling to their current customer base, which can be a cost-effective and efficient way to grow their business.

Submit
49. Please identify main functionalities of EMMC Integration. Choose all correct options.

Explanation

EMMC Integration provides several main functionalities. Firstly, it ensures that device information is up-to-date and any changes are automatically brought into RADAR. This helps in maintaining accurate and current device information. Secondly, by retrieving the device's current carrier from EMM, RADAR can determine the roaming state of the device. This enables the application of appropriate data policies for roaming and domestic usage, regardless of the app being present on the device. Additionally, EMMC Integration allows the building of a catalog of the app inventory on the device. This information is then used by the Wandera threat correlation engine for device and network-based threat detection. Lastly, it enables the remote removal of applications by administrators from RADAR.

Submit
50. Name any three reports available under Data Cost Management section on RADAR.

Explanation

Reports available under Data Cost Management section are Usage, Roaming, Sites/Apps, Categories, Business/Personal, Tethering and User Summary

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 14, 2016
    Quiz Created by
    Stijn Paumen
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Wandera's threat R&D team publishes regular one-pagers on...
What is Wandera's unique advantage against competition?
What is the USP of Wandera solution?
How is data routed via Wandera cloud gateway?
What happens when a user is blocked by a Wandera policy?
What is RADAR ?
Identify different options for defining data usage costs in plan...
Is it possible to create different policies based on groups of users...
What is the standard SLA for availability of Wandera service?
Name key capabilities of Wandera solution to tackle challenges...
Is it possible to export data from RADAR?
How does Wandera provide redundancy?
How does Wandera calculate savings to include in ROI reports?
Wandera recently changed its licensing model from vertical functional...
XCodeGhost was a vulnerability identified for iOS devices in 2015
What happens when a roaming user reaches their assigned data...
What are the supported EMM/MDM platforms for EMMC Integration?
Is it possible to configure notifications to be sent out and how are...
Does Wandera have an element of tamper proofing built into the service...
Which data center providers does Wandera use?
How long does it take for any policy changes made through RADAR to...
Wandera and EMM/MDM are complementary solutions. True or False?
During the first half of 2016, Wandera is planning to release an...
Where should a partner register new leads with Wandera?
Which of the following device platforms are supported by Wandera...
How is Wandera service activated on the device? Choose all correct...
Name two different types of policies defined in RADAR.
What is the standard document produced by Wandera on completion of...
RADAR allows administrators to define data policies and security...
Identify three different types of Man-in-the-Middle attacks which are...
Which protocols are routed via Wandera cloud gateway? 
What are the supported EMM/MDM platforms for App Push feature?
How can administrators use Wandera to measure the severity of threats...
What is SmartWire Cloud Intelligence?
Is Wandera App mandatory to running Wandera service?
What is the Wandera App used for? 
What are the key challenges associated with adoption of enterprise...
Approximately how many categories does Wandera offer to help manage...
What is Semi-Jailbreak and why does it represent high risk?
Where is the data stored and what is the standard data retention...
Wandera uses a multi-level architecture. Name different points of data...
During the first half of 2016, Wandera is planning to release Wi-Fi...
What are device 'Heartbeats'?
How are mobile threats categorised and secured by Wandera solution?...
Please identify different options available for trialing Wandera...
What are the different time intervals for which data policies can be...
Select different traffic types that do not route via Wandera cloud...
A key part of Wandera's sales strategy is "land and...
Please identify main functionalities of EMMC Integration. Choose all...
Name any three reports available under Data Cost Management section on...
Alert!

Advertisement