Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Your organization has corporate-owned mobile devices. You are creating security controls to find these devices if they are lost or stolen. Which of the

1. Your organization has corporate-owned mobile devices. You are creating security controls to find these devices if they are lost or stolen. Which of the following BEST meets this goal?
    A.     geolocation
    B.     screen locks
    C.     storage segmentation
    D.     geofencing

2. _____ is a connection method for mobile devices also known as 802.11 wireless networks. Usually, we choose from a list of SSIDs (service set identifiers). WPA3 is used for encrypting the network traffic.
    A.     Wi-Fi
    B.     NFC (near field communication)
    C.     Cellular
    D.     Bluetooth

3. Which of the following deployment models is when an organization gives employees a list of mobile devices to choose from?
    A.     Corporate-owned
    B.     BYOD
    C.     COPE
    D.     CYOD

4. Which of the following is the MOST likely to put an organization at risk for data exfiltration?
    A.     firmware OTA (over the air) updates
    B.     USB OTG (on-the-go)
    C.     GPS tagging
    D.     SMS (Short Message Service)

5. Which of the following deployment models is when an organization hosts their employee’s desktop operating systems on a server?
    A.     CYOD
    B.     BYOD
    C.     COPE
    D.     VDI

6. What is a potential risk of using SMS (Short Message Service), MMS (Multimedia Messaging Service), or RCS (Rich Communication Services)?
    A.     GPS tagging
    B.     eavesdropping
    C.     sideloading
    D.     carrier unlocking

7. _____ is a connection method for mobile devices that is wireless. We have these tags inside animals, on packaging for products, on shipping containers, on ID badges to enter a building, library books, etc. These chips are very small, usually about the size of a grain of rice.
    A.     Radio-frequency identification (RFID)
    B.     USB (Universal Serial Bus)
    C.     Global Positioning System (GPS)
    D.     Infrared

8. Which of the following is the MOST likely to put an organization at risk for data exfiltration?
    A.     GPS tagging
    B.     mobile device cameras
    C.     sideloading
    D.     firmware OTA (over the air) updates

9. This will send a signal to the mobile device to erase all the data.
    A.     geofencing
    B.     geolocation
    C.     remote wipe
    D.     content management

10. People can use this method to install an app from unknown sources on an Android device.
    A.     tethering
    B.     sideloading
    C.     jailbreaking
    D.     carrier unlocking

Step by Step Solution

3.41 Rating (157 Votes )

There are 3 Steps involved in it

Step: 1

1 A geolocation 2 A WiFi 3 D CYOD 4 ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditing a business risk appraoch

Authors: larry e. rittenberg, bradley j. schwieger, karla m. johnston

6th Edition

9780324645095, 324645090, 978-0324375589

More Books

Students also viewed these Computer Network questions

Question

Summarize the findings of psychotherapy efficacy studies.

Answered: 1 week ago