Which of the following is the term for a fix for a known software problem?
Which of the following is the term for a fix for a known software problem?
Which of the following practices is used to mitigate a known security vulnerability?
Which of the following practices is used to mitigate a known security vulnerability?
Which of the following can a security administrator implement on mobile devices that will help prevent unwante
Which of the following can a security administrator implement on mobile devices that will help prevent
unwanted people from viewing the data if the device is left unattended?
Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device i
Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the
device is stolen? (Select TWO).
Which of the following controls can be implemented together to prevent data loss in the event of theft of a mo
Which of the following controls can be implemented together to prevent data loss in the event of theft of
a mobile device storing sensitive information? (Select TWO).
A way to assure data at-rest is secure even in the event of loss or theft is to use:
A way to assure data at-rest is secure even in the event of loss or theft is to use:
Which of the following should Matt, a security administrator, include when encrypting smartphones?
Which of the following should Matt, a security administrator, include when encrypting smartphones?
(Select TWO).
Which of the following would BEST prevent the disclosure of customer data in the event that a tablet is lost o
A bank has recently deployed mobile tablets to all loan officers for use at customer sites. Which of the
following would BEST prevent the disclosure of customer data in the event that a tablet is lost or stolen?
Which of the following would provide the solution BEST meets the company’s requirements?
A small company has recently purchased cell phones for managers to use while working outside if the
office.
The company does not currently have a budget for mobile device management and is primarily
concerned with deterring leaks if sensitive information obtained by unauthorized access to unattended
phones. Which of the following would provide the solution BEST meets the company’s requirements?
Which of the following BEST addresses his concerns?
Pete, the system administrator, has concerns regarding users losing their company provided
smartphones. Pete’s focus is on equipment recovery. Which of the following BEST addresses his
concerns?
