Which of the following options should be allowed on mobile devices to ensure the employees are able to route &
An insurance company has employees responding to a regional disaster through use of mobile
printers and tablet devices. Which of the following options should be allowed on mobile devices to
ensure the employees are able to route through a number of impassable road ways in order to aid
customers as quickly as possible?
Which of the following policies is MOST likely causing this issue to occur?
Joe, an employee, from a company with a BYOD policy synchronizes his mobile device
information to his home computer on a weekly basis. After connecting to Joe’s corporate network
for the first time, all of his stored files are no longer recognized by his home computer. Which of
the following policies is MOST likely causing this issue to occur?
Which of the following is MOST likely causing both of these issues to occur?
After Ann, an employee, connects to the corporate network, her mobile device data usage spikes
and menu options appear differently than before. Which of the following is MOST likely causing
both of these issues to occur?
Which of the following can be used to ensure login credentials are secured when in transit from a mobile devic
Which of the following can be used to ensure login credentials are secured when in transit from a
mobile device’s browser to a web server? (Select THREE).
Which of the following would fulfill this requirement?
An information security consultant has recommended that mobile devices for special agents use
two-factor authentication. Which of the following would fulfill this requirement?
Which of the following should be reviewed to determine if authentication attempts have failed after the device
An administrator is tasked with remotely wiping the Chief Information Officer’s (CIO’s) device after
it is reported stolen. Which of the following should be reviewed to determine if authentication
attempts have failed after the device was stolen?
Which of the following questions would be MOST helpful in determining the next step in troubleshooting?
Joe, an employee, contacts the database administrator about an issue with a local database on
his hard drive. Which of the following questions would be MOST helpful in determining the next
step in troubleshooting?
Which of the following is at risk of occurring in this scenario?
An outside firm has been hired to conduct a penetration test on a company. The firm informs the
company of what tools may be used, when the test will be completed, and the IP addresses they
will be attacking from. The IPS is setup to ignore all alerts geared around the tools during this
timeframe. Which of the following is at risk of occurring in this scenario?
The main difference between CDMA and TDMA is that:
The main difference between CDMA and TDMA is that:
Which of the following should Ann recommend to provide adequate wireless coverage throughout the theatre?
Ann, a contractor, has conducted a passive wireless site survey of a theatre. She noticed that the
control room uses sound proof walls reinforced with a metal mesh. Which of the following should
Ann recommend to provide adequate wireless coverage throughout the theatre?