Which of the following can a security administrator implement on mobile devices that will help prevent
unwanted people from viewing the data if the device is left unattended?
A.
Screen lock
B.
Voice encryption
C.
GPS tracking
D.
Device encryption
Explanation:
Screen-lock is a security feature that requires the user to enter a PIN or a password after a short period of
inactivity before they can access the system again. This feature ensures that if your device is left
unattended or is lost or stolen, it will be difficult for anyone else to access your data or applications.
Incorrect Answers:
B: Voice encryption is used to protect audio (voice) transmission. It cannot secure data stored on a mobile
device.
C: Global Positioning System (GPS) tracking can be used to identify its location of a stolen device and can
allow authorities to recover the device. However, for GPS tracking to work, the device must have an
Internet connection or a wireless phone service over which to send its location information.
D: Device encryption encrypts the data on the device. This feature ensures that the data on the device
cannot be accessed in a useable form should the device be stolen.Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,
2014, pp. 418-419Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 237
https://www.ukash.com/en-SI/mobile-device-security/