S+ Objective 4.2 Quiz

Descripción

Summarize mobile security concepts and technologies.
Tyler Hampton
Test por Tyler Hampton, actualizado hace más de 1 año
Tyler Hampton
Creado por Tyler Hampton hace alrededor de 6 años
7
0

Resumen del Recurso

Pregunta 1

Pregunta
Your company has recently provided mobile devices to several employees. A security manager has expressed concerns related to data saved on these devices. Which of the following would BEST address these concerns?
Respuesta
  • Disabling the use of removable media
  • Installing an application that tracks the location of the device
  • Implementing a BYOD policy
  • Enable geo-tagging

Pregunta 2

Pregunta
Your company provides electrical and plumbing services to homeowners. Employees use tablets during service calls to record activity, create invoices, and accept credit card payments. Which of the following would BEST prevent disclosure of customer data if any of these devices are lost or stolen?
Respuesta
  • Mobile device management
  • Disabling unused features
  • Remote wiping
  • GPS tracking

Pregunta 3

Pregunta
Key personnel in your organization have mobile devices, which store sensitive information. What can you implement to prevent data loss from these devices if a thief steals one?
Respuesta
  • Asset tracking
  • Screen lock
  • Account lockouts
  • GPS tracking
  • Remote Wipe Capabilities
  • Mobile Device Management
  • Full Device Encryption

Pregunta 4

Pregunta
Which of the following represents a primary security concern when authorizing mobile devices on a network?
Respuesta
  • Cost of the device
  • Compatibility
  • Virtualization
  • Data security

Pregunta 5

Pregunta
Of the following choices, what are the valid security controls for mobile devices?
Respuesta
  • Screen locks, device encryption, and remote wipe
  • Host-based firewalls, pop-up blockers, and SCADA access
  • Antivirus software, voice encryption, and NAC
  • Remote lock, NAC, and locking cabinets

Pregunta 6

Pregunta
A new mobile device security policy has authorized the use employee-owned devices, but mandates additional security controls to protect them if devices are lost or stolen. Which of the following BEST meets this goal?
Respuesta
  • Screen locks and geo-tagging
  • Geo-tagging and asset tracking
  • Screen locks and device encryption
  • Full device encryption and IaaS

Pregunta 7

Pregunta
You want to deter an attacker from using brute force to gain access to a mobile device. What would you configure?
Respuesta
  • Remote wiping
  • Account lockout settings
  • GPS tracking
  • RFID

Pregunta 8

Pregunta
Management within your company is considering allowing users to connect to the corporate network with their personally owned devices. Which of the following represents a security concern with this policy?
Respuesta
  • Inability to ensure devices are up to date with current system patches
  • Difficulty in locating lost devices
  • Cost of the devices
  • Devices might not be compatible with applications within the network

Pregunta 9

Pregunta
Your organization is planning to issue mobile devices to some employees, but they are concerned about protecting the confidentiality of data if the devices are lost or stolen. Which of the following is the BEST way to secure data at rest on a mobile device?
Respuesta
  • Strong passwords
  • Hashing
  • RAID-6
  • Full-device Encryption
Mostrar resumen completo Ocultar resumen completo

Similar

S+ Objective 4.4 Quiz
Tyler Hampton
Security+ High Availability Percentages
Lyndsay Badding
Security+ Cryptography
Lyndsay Badding
S+ Objective 2.1 Risk Calculation Flashcards
Tyler Hampton
S+ Objective 5.1 Authentication Services Flashcards
Tyler Hampton
S+ Obj 3.2 Cyber Attacks Flashcards
Tyler Hampton
S+ Objective 5.1 Authentication Services Visualization
Tyler Hampton
S+ Objective 1.1 Network Technologies Flashcards
Tyler Hampton
S+ Objective 1.1 Network Devices Flashcards
Tyler Hampton
S+ Objective 1.2 Network Administration Principles Flashcards
Tyler Hampton
S+ Obj 3.4 Wireless Attacks
Tyler Hampton