Test 15 Flashcards
Which of the terms listed below is used to describe a foundational level of security configurations and settings required to safeguard a system?
Secure baseline
Installing mobile apps from trusted sources (e.g., Apple’s App Store for iOS devices, or Google Play for Android devices) instead of third-party application stores decreases malware-related security risks.
True
Data on a lost or stolen mobile device can be erased by:
Remote wipe
Which of the following answers refers to a mobile security solution that enables separate controls over the user and enterprise data?
Storage segmentation
Implementing full device encryption is one of the methods for securing sensitive data on a smartphone. When enabled, this type of encryption works in conjunction with the phone’s screen lock, i.e., to decrypt the phone (which stays encrypted whenever the phone is locked), a user must first unlock the screen. On Android devices, the unlocking methods include entering a PIN, password, or drawing a simple pattern with a finger. Apple devices use passcodes, facial recognition (Face ID), and fingerprint (Touch ID).
True
In the context of MDM, the isolation of corporate applications and data from other parts of the mobile device is referred to as:
Containerization
Which of the answers listed below refer to workstation hardening techniques? (Select 3 answers)
Regularly applying security patches and updates to the OS and installed software
Removing or disabling unnecessary drivers, services, software, and network protocols ( Missed)
Limiting unauthorized or unauthenticated user access
Which of the following answers refer(s) to (a) router hardening technique(s)? (Select all that apply)
Changing default credentials ( Missed)
Disabling unused services and ports
Implementing regular firmware updates
Which of the answers listed below refers to the process of assessing the physical environment, such as the layout of the building, to identify potential sources of interference and determine the optimal placement of a WAP?
Site survey
An administrator needs to adjust the placement of multiple APs to ensure the best wireless signal coverage for the network. Which of the following would be of help in identifying areas of low signal strength?
Heat map
Which type of software enables centralized administration of mobile devices?
MDM
Which of the answers listed below refers to software that facilitates the enforcement of mobile device policies and procedures?
MDM
A mobile device deployment model that allows employees to use private mobile devices for accessing company’s restricted data and applications is known as:
BYOD
Which of the answers listed below refers to a mobile device deployment model where organizations provide and own the devices while allowing their personal use?
COPE
What is the name of a mobile device deployment model in which employees select devices for work-related tasks from a company-approved device list?
CYOD