PrepAway - Latest Free Exam Questions & Answers

Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device i

Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the
device is stolen? (Select TWO).

PrepAway - Latest Free Exam Questions & Answers

A.
Tethering

B.
Screen lock PIN

C.
Remote wipe

D.
Email password

E.
GPS tracking

F.
Device encryption

Explanation:
C: Remote wipe is the process of deleting data on a device in the event that the device is stolen. This is
performed over remote connections such as the mobile phone service or the internet connection and
helps ensure that sensitive data is not accessed by unauthorized people.
F: Device encryption encrypts the data on the device. This feature ensures that the data on the device
cannot be accessed in a useable form should the device be stolen.
Incorrect Answers:
A: Device tethering is the process of connecting one device to another over a wireless LAN (Wi-Fi) or
Bluetooth connection or by using a cable. This allows the tethered devices to share an Internet
connection. It does not protect the device against data loss in the event of the device being stolen.B: Screen locks are a security feature that requires the user to enter a PIN or a password after a short
period of inactivity before they can access the system again. This feature ensures that if your device is left
unattended or is lost or stolen, it will be a bit difficult for anyone else to access your data or applications.
However, screen locks may have workarounds, such as accessing the phone application through the
emergency calling feature.
D: Some email applications allow users to set a password on an email that could be shared with the
recipient. This does not protect against sensitive data loss if the device is stolen.
E: Global Positioning System (GPS) tracking can be used to identify its location of a stolen device and can
allow authorities to locate the device. However, for GPS tracking to work, the device must have an
Internet connection or a wireless phone service over which to send its location information.

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,
2014, pp. 418-419
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 236, 237


Leave a Reply