Mobile Device Security
load
It is recommended that ---- testing be performed to ensure that your design or existing infrastructure can support the potentially large number of connections from multiple devices.
Remote lock
What is usually the first step taken in securing a mobile device? This protects a device that has been lost or stolen.
Screen lock
What should be enforced for all mobile devices, should follow corporate password policy, and can implement auto wiping?
Antivirus malware
---- and ---- protection should be employed as widely as possible and kept up-to-date against current threats for mobile devices.
separate
A company-issued smartphone can be repossessed upon the employee's termination; however, sensitive data could still remain, even with factory reset. On the other hand, if an employee uses a personal device for business purposes, up termination of the employee, it is likely some company data remains on the phone despite the companies best efforts to remove them. Storage segmentation should be implemented to help deal with this issue, keeping data in separate, MDM managed containers?
Mobile devices
Access control for what needs to be managed just like access control from wired or wireless desktops and laptops?
Support
Because each device has its own implementation of various functions, the help desk or support organization has a very difficult time being knowledgeable on all aspects of all possible devices that access a corporate network. So, the cost of what for mobile devices are an important consideration?
Mobile devices
Employee termination needs to include termination of accounts on what?
Privacy
Expectations of what and data access should be included in your company policy for personal mobile devices used for business purposes?
encryption
MDM policy should require ---- of data on the device.
strong
MDM policy should require Device locking with a ---- password.
locking
MDM policy should require device ---- automatically after a certain period of inactivity.
remotely
MDM policy should require the capability to ---- lock the device if it is lost or stolen.
remotely
MDM policy should require the capability to ---- wipe the device if it is lost or stolen.
wipe
MDM policy should require the capability to wipe the device automatically after a certain number of failed login attempts.
Enterprise application store
What can a company implement to allow only company-approved applications to be downloaded and used on mobile devices?
GPS
What can be used for tracking device location and assists in the recovery of lost devices?
Separates them
What does storage segmentation in mobile devices do regarding personal data and corporate data and applications? ANSWER STRUCTURE: ---- them
MDM
What is a marketing term for a collective set of commonly employed protection elements associated with mobile devices?
Storage segmentation
What is it called when personal data is separated from corporate data and applications?
Sensitive
jailbroken or rooted mobile devices should not be allowed on your corporations network or allowed to access what kind of data?