Your company has recently provided mobile devices to several employees. A security manager has expressed concerns related to data saved on these devices. Which of the following would BEST address these concerns?
Respuesta
Disabling the use of removable media
Installing an application that tracks the location of the device
Implementing a BYOD policy
Enable geo-tagging
Pregunta 2
Pregunta
Your company provides electrical and plumbing services to homeowners. Employees use tablets during service calls to record activity, create invoices, and accept credit card payments. Which of the following would BEST prevent disclosure of customer data if any of these devices are lost or stolen?
Respuesta
Mobile device management
Disabling unused features
Remote wiping
GPS tracking
Pregunta 3
Pregunta
Key personnel in your organization have mobile devices, which store sensitive information. What can you implement to prevent data loss from these devices if a thief steals one?
Respuesta
Asset tracking
Screen lock
Account lockouts
GPS tracking
Remote Wipe Capabilities
Mobile Device Management
Full Device Encryption
Pregunta 4
Pregunta
Which of the following represents a primary security concern when authorizing mobile devices on a network?
Respuesta
Cost of the device
Compatibility
Virtualization
Data security
Pregunta 5
Pregunta
Of the following choices, what are the valid security controls for mobile devices?
Respuesta
Screen locks, device encryption, and remote wipe
Host-based firewalls, pop-up blockers, and SCADA access
Antivirus software, voice encryption, and NAC
Remote lock, NAC, and locking cabinets
Pregunta 6
Pregunta
A new mobile device security policy has authorized the use employee-owned devices, but mandates additional security controls to protect them if devices are lost or stolen. Which of the following BEST meets this goal?
Respuesta
Screen locks and geo-tagging
Geo-tagging and asset tracking
Screen locks and device encryption
Full device encryption and IaaS
Pregunta 7
Pregunta
You want to deter an attacker from using brute force to gain access to a mobile device. What would you configure?
Respuesta
Remote wiping
Account lockout settings
GPS tracking
RFID
Pregunta 8
Pregunta
Management within your company is considering allowing users to connect to the corporate network with their personally owned devices. Which of the following represents a security concern with this policy?
Respuesta
Inability to ensure devices are up to date with current system patches
Difficulty in locating lost devices
Cost of the devices
Devices might not be compatible with applications within the network
Pregunta 9
Pregunta
Your organization is planning to issue mobile devices to some employees, but they are concerned about protecting the confidentiality of data if the devices are lost or stolen. Which of the following is the BEST way to secure data at rest on a mobile device?