Chapter 9 Enterprise Mobility and Endpoint Security Flashcards
Some executives from an organization attend an industry conference. Using mobile devices and wireless headsets, they are able to stay in touch with colleagues back at the workplace. What may present a security concern in this situation?
A. Tethering
B. WPA3
C. Device Certificates
D. Bluetooth
D. Bluetooth
Some marketing executives from an organization attend an international trade exhibition and must connect to the company email by using their mobile devices during the event. The CISO is concerned this may represent a risk. What would best mitigate this risk?
A. NFC
B. A split tunnel VPN
C. Geofencing
D. Always on VPN Settings
D. Always on VPN Settings
What function should be disabled to ensure scientists cannot use their mobile devices to bridge the corporations network with a cellular operators network?
A. Tethering
B. WPA3
C. Device Certificates
D. Bluetooth
A. Tethering
What should be implemented to ensure only company approved applications can be installed on company devices?
A. Containerization
B. Token based access
C. A patch repository
D. Whitelisting
D. Whitelisting
A user calls the service desk because her Samsung smart phone is prompting her to install updates that the vendor says will offer more functionality and security. What is this an example of?
A. MFA requirements
B. Token based access
C. A patch repo
D. Firmware over the air
D. Firmware over the air
An employee’s company mobile device is reported as stolen 24 hours after the event. Sensitive data has been posted online by hackers. What would have mitigated this risk if the report had been made earlier?
A. MFA requirements
B. A remote wipe
C. A patch repo
D. Firmware over the air
B. A remote wipe
What type of setting will ensure mobile devices will only be able to access WiFi when they connect securely to the company WLAN?
A. WPA3 SAE
B. Device certificates
C. Device profiles
D. Bluetooth
C. Device profiles
An employee has noticed several suspicious payments made from a company debit card via Google Pay on their company smartphone. They recently attended a busy trade conference.. What technology was likely used to make the payments?
A. NFC
B. Peripherals
C. Geofencing
D. VPN settings
A. NFC
How can we prevent certain mobile applications from being accessible when employees take COPE devices out of the warehouse?
A. NFC
B. MFA
C. Geofencing
D. VPN settings
C. Geofencing
The service desk receives a call from a senior manager. She is concerned that spyware may be installed on her smartphone. Recent news, traffic, and weather updates have been targeted specifically for her location. What is the most likely reason for this activity?
A. Airplane mode
B. Location services
C. NFC
D. Geofencing
B. Location services
A user is concerned that DNS lookups may be logged by government agencies. The user would like to protect their privacy. What would be the best method to protect privacy during name resolution?
A. Geofencing
B. VPN Settings
C. DNS over HTTPS (DoH)
D. Containerization
C. DNS over HTTPS (DoH)
A nation state sends a security team to scope out a military site in California in the United States. They use mobile devices to gather images, map the locations of communications equipment and record detailed information about troop movements. What are they performing?
A. Geotagging
B. Geofencing
C. Physical recon
D. Personal data theft
C. Physical recon
A personal device has many applications installed that are not available through the Apple App Store. The device subsequently fails compliance checks. What has likely made the device fail to be compliant with the security policies?
A. Jailbreaking
B. Sideloading
C. Containerization
D. An unauthorized application store
A. Jailbreaking
A senior employee has followed a QC link and installed a mobile application used to order food and beverages at a local restaurant. The application is not available on the Google play store. Acceptable use policy states that applications can only be downloaded from the official vendor store. What best describes what has allowed this application to be installed?
A. Supply chain issues
B. Sideloading
C. Containerization
D. An unauthorized application store
D. An unauthorized application store
Developers need to test mobile applications on a variety of hardware before making them available on official application stores. How can they install the applications locally on mobile devices?
A. Update the supply chain
B. Use sideloading
C. Use containerization
D. Use an unauthorized application store
B. Use sideloading