Which of the following should Matt, a security administrator, include when encrypting smartphones?
Which of the following should Matt, a security administrator, include when encrypting smartphones?
(Select TWO).
Which of the following would BEST prevent the disclosure of customer data in the event that a tablet is lost o
A bank has recently deployed mobile tablets to all loan officers for use at customer sites. Which of the
following would BEST prevent the disclosure of customer data in the event that a tablet is lost or stolen?
Which of the following would provide the solution BEST meets the company’s requirements?
A small company has recently purchased cell phones for managers to use while working outside if the
office.
The company does not currently have a budget for mobile device management and is primarily
concerned with deterring leaks if sensitive information obtained by unauthorized access to unattended
phones. Which of the following would provide the solution BEST meets the company’s requirements?
Which of the following BEST addresses his concerns?
Pete, the system administrator, has concerns regarding users losing their company provided
smartphones. Pete’s focus is on equipment recovery. Which of the following BEST addresses his
concerns?
which of the following should be done at the beginning?
After a security incident involving a physical asset, which of the following should be done at the
beginning?
Which of the following BEST meets the requirements?
The chief Risk officer is concerned about the new employee BYOD device policy and has requested the
security department implement mobile security controls to protect corporate data in the event that a
device is lost or stolen. The level of protection must not be compromised even if the communication SIM
is removed from the device. Which of the following BEST meets the requirements? (Select TWO)
Which of the following technical controls helps to prevent Smartphones from connecting to a corporate network?
Which of the following technical controls helps to prevent Smartphones from connecting to a corporate
network?
Which of the following BEST meets this need?
Jane, an IT security technician, needs to create a way to secure company mobile devices. Which of the
following BEST meets this need?
which of the following?
Allowing unauthorized removable devices to connect to computers increases the risk of which of the
following?
which of the following?
The marketing department wants to distribute pens with embedded USB drives to clients. In the past this
client has been victimized by social engineering attacks which led to a loss of sensitive data. The security
administrator advises the marketing department not to distribute the USB pens due to which of the
following?