Mobile Device Security Flashcards

1
Q

Which of the following guidelines must be followed to protect a mobile device from malicious attackers?

A

Do not share information within GPS-enabled apps unless necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Steve, a security professional, was instructed to provide secure access to corporate data on mobile devices across the organizational networks without compromising on access speed. In this process, Steve deployed a security solution that involves encrypting important information and allowing accessing, transmitting, or storing important information on only authorized apps using strong password protection policies.

Identify the mobile security management solution employed by Steve in the above scenario.

A

Vaultize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following technologies is referred to as a wireless sensor protocol that enables communication between sensors and their controllers?

A

ANT
It is a wireless sensor protocol that enables communication between sensors and their controllers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly