2.8 - Given a scenario, implement methods for securing mobile devices. Flashcards

1
Q

Screen locks.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Locator applications and remote wipe.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Remote backup.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anti-virus and Anti-malware.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Patching/ OS updates.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Biometric authentication.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authenticator apps.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Full device encryption.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trusted vs. untrusted sources.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewalls.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Policies and procedures.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly