2.8 - Given a scenario, implement methods for securing mobile devices. Flashcards
1
Q
Screen locks.
A

2
Q
Locator applications and remote wipe.
A

3
Q
Remote backup.
A

4
Q
Anti-virus and Anti-malware.
A

5
Q
Patching/ OS updates.
A

6
Q
Biometric authentication.
A

7
Q
Authenticator apps.
A

8
Q
Full device encryption.
A

9
Q
Trusted vs. untrusted sources.
A

10
Q
Firewalls.
A

11
Q
Policies and procedures.
A
