Which of the following technical controls helps to prev…
Which of the following technical controls helps to prevent Smartphones from connecting to a corporate
network?
Which of the following BEST meets the requirements?
The chief Risk officer is concerned about the new employee BYOD device policy and has requested the
security department implement mobile security controls to protect corporate data in the event that a device is
lost or stolen. The level of protection must not be compromised even if the communication SIM is removed
from the device. Which of the following BEST meets the requirements? (Choose two.)
which of the following should be done at the beginning?
After a security incident involving a physical asset, which of the following should be done at the beginning?
Which of the following BEST addresses his concerns?
Pete, the system administrator, has concerns regarding users losing their company provided smartphones.
Pete’s focus is on equipment recovery. Which of the following BEST addresses his concerns?
Which of the following would provide the solution BEST …
A small company has recently purchased cell phones for managers to use while working outside if the office.
The company does not currently have a budget for mobile device management and is primarily concerned with
deterring leaks if sensitive information obtained by unauthorized access to unattended phones. Which of the
following would provide the solution BEST meets the company’s requirements?
Which of the following would BEST prevent the disclosur…
A bank has recently deployed mobile tablets to all loan officers for use at customer sites. Which of the following
would BEST prevent the disclosure of customer data in the event that a tablet is lost or stolen?
Which of the following should Matt, a security administ…
Which of the following should Matt, a security administrator, include when encrypting smartphones? (Choose
two.)
A way to assure data at-rest is secure even in the even…
A way to assure data at-rest is secure even in the event of loss or theft is to use:
Which of the following controls can be implemented toge…
Which of the following controls can be implemented together to prevent data loss in the event of theft of a
mobile device storing sensitive information? (Choose two.)
Which of the following can be used on a smartphone to B…
Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is
stolen? (Choose two.)