Your company has recently provided mobile devices to several employees. A security manager has expressed concerns related to data saved on these devices. Which of the following would BEST address these concerns?
Answer
Disabling the use of removable media
Installing an application that tracks the location of the device
Implementing a BYOD policy
Enable geo-tagging
Question 2
Question
Your company provides electrical and plumbing services to homeowners. Employees use tablets during service calls to record activity, create invoices, and accept credit card payments. Which of the following would BEST prevent disclosure of customer data if any of these devices are lost or stolen?
Answer
Mobile device management
Disabling unused features
Remote wiping
GPS tracking
Question 3
Question
Key personnel in your organization have mobile devices, which store sensitive information. What can you implement to prevent data loss from these devices if a thief steals one?
Answer
Asset tracking
Screen lock
Account lockouts
GPS tracking
Remote Wipe Capabilities
Mobile Device Management
Full Device Encryption
Question 4
Question
Which of the following represents a primary security concern when authorizing mobile devices on a network?
Answer
Cost of the device
Compatibility
Virtualization
Data security
Question 5
Question
Of the following choices, what are the valid security controls for mobile devices?
Answer
Screen locks, device encryption, and remote wipe
Host-based firewalls, pop-up blockers, and SCADA access
Antivirus software, voice encryption, and NAC
Remote lock, NAC, and locking cabinets
Question 6
Question
A new mobile device security policy has authorized the use employee-owned devices, but mandates additional security controls to protect them if devices are lost or stolen. Which of the following BEST meets this goal?
Answer
Screen locks and geo-tagging
Geo-tagging and asset tracking
Screen locks and device encryption
Full device encryption and IaaS
Question 7
Question
You want to deter an attacker from using brute force to gain access to a mobile device. What would you configure?
Answer
Remote wiping
Account lockout settings
GPS tracking
RFID
Question 8
Question
Management within your company is considering allowing users to connect to the corporate network with their personally owned devices. Which of the following represents a security concern with this policy?
Answer
Inability to ensure devices are up to date with current system patches
Difficulty in locating lost devices
Cost of the devices
Devices might not be compatible with applications within the network
Question 9
Question
Your organization is planning to issue mobile devices to some employees, but they are concerned about protecting the confidentiality of data if the devices are lost or stolen. Which of the following is the BEST way to secure data at rest on a mobile device?