Mobile Device Security Flashcards
Which of the following guidelines must be followed to protect a mobile device from malicious attackers?
Do not share information within GPS-enabled apps unless necessary
Steve, a security professional, was instructed to provide secure access to corporate data on mobile devices across the organizational networks without compromising on access speed. In this process, Steve deployed a security solution that involves encrypting important information and allowing accessing, transmitting, or storing important information on only authorized apps using strong password protection policies.
Identify the mobile security management solution employed by Steve in the above scenario.
Vaultize
Which of the following technologies is referred to as a wireless sensor protocol that enables communication between sensors and their controllers?
ANT
It is a wireless sensor protocol that enables communication between sensors and their controllers.