Question
1. Your organization has corporate-owned mobile devices. You are creating security controls to find these devices if they are lost or stolen. Which of the
1. Your organization has corporate-owned mobile devices. You are creating security controls to find these devices if they are lost or stolen. Which of the following BEST meets this goal?
A. geolocation
B. screen locks
C. storage segmentation
D. geofencing
2. _____ is a connection method for mobile devices also known as 802.11 wireless networks. Usually, we choose from a list of SSIDs (service set identifiers). WPA3 is used for encrypting the network traffic.
A. Wi-Fi
B. NFC (near field communication)
C. Cellular
D. Bluetooth
3. Which of the following deployment models is when an organization gives employees a list of mobile devices to choose from?
A. Corporate-owned
B. BYOD
C. COPE
D. CYOD
4. Which of the following is the MOST likely to put an organization at risk for data exfiltration?
A. firmware OTA (over the air) updates
B. USB OTG (on-the-go)
C. GPS tagging
D. SMS (Short Message Service)
5. Which of the following deployment models is when an organization hosts their employee’s desktop operating systems on a server?
A. CYOD
B. BYOD
C. COPE
D. VDI
6. What is a potential risk of using SMS (Short Message Service), MMS (Multimedia Messaging Service), or RCS (Rich Communication Services)?
A. GPS tagging
B. eavesdropping
C. sideloading
D. carrier unlocking
7. _____ is a connection method for mobile devices that is wireless. We have these tags inside animals, on packaging for products, on shipping containers, on ID badges to enter a building, library books, etc. These chips are very small, usually about the size of a grain of rice.
A. Radio-frequency identification (RFID)
B. USB (Universal Serial Bus)
C. Global Positioning System (GPS)
D. Infrared
8. Which of the following is the MOST likely to put an organization at risk for data exfiltration?
A. GPS tagging
B. mobile device cameras
C. sideloading
D. firmware OTA (over the air) updates
9. This will send a signal to the mobile device to erase all the data.
A. geofencing
B. geolocation
C. remote wipe
D. content management
10. People can use this method to install an app from unknown sources on an Android device.
A. tethering
B. sideloading
C. jailbreaking
D. carrier unlocking
Step by Step Solution
3.41 Rating (157 Votes )
There are 3 Steps involved in it
Step: 1
1 A geolocation 2 A WiFi 3 D CYOD 4 ...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started