Labsim 10.7.7 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Users in the sales department perform many of their daily tasks, such as emailing and creating sales presentations, on their personal tablets. The chief information officer worries that one of these users might also use their tablet to steal sensitive information from the organization's network. Your job is to implement a solution that prevents insiders from accessing sensitive information stored on the organization's network from their personal devices while still giving them access to the internet. Which of the following should you implement?

A guest wireless network that is isolated from your organization's production network

Consider two strategies: bring your own device (BYOD) and choose your own device. The IT team evaluated the benefits and risks associated with each approach. Which of the following statements about BYOD and CYOD are correct? (Select two.) Bring your own device and choose your own device have the same level of control and management by the IT department. Bring your own device allows employees to use their personal devices for work purposes. Choose your own device limits device choices to a predefined list of approved options. Choose your own device provides employees with the freedom to select any device for work, regardless of security concerns. Bring your own device (BYOD) allows businesses to purchase devices at significant discounts.

Bring your own device allows employees to use their personal devices for work purposes AND Choose your own device limits device choices to a predefined list of approved options.

You are the IT Security Manager at a mid-sized company. The company has recently adopted a bring your own device (BYOD) policy. One of your employees, John, has been using his personal device for work-related tasks. John's device gets infected with malware, which he unknowingly connects to the company's network. As a result, the malware spreads across the network, compromising sensitive data. As the IT Security Manager, what should be your immediate course of action?

Disconnect John's device from the network, isolate the affected systems, and start an investigation to understand the extent of the damage caused.

What could be an example of a malicious insider attack?

A user uses the built in microphone to record conversations.

What best describes a policy that defines appropriate and inappropriate usage of company resources, assets and communications?

Acceptable Use Policy (AUP)

What best describes an Acceptable Use Agreement?

An agreement that identifies employees' rights to use company property, such as internet access and computer equipment, for personal use.

Users in the sales department perform many of their daily tasks, such as emailing and creating sales presentations, on company-owned tablets. These tablets contain sensitive information. If one of these tablets is lost or stolen, this information could end up in the wrong hands. The chief information officer wants you to implement a solution that can be used to keep sensitive information from getting into the wrong hands if a device is lost or stolen. Which of the following should you implement?

Implement a mobile device management (MDM) infrastructure

The IT manager has tasked you with implementing a solution that ensures that mobile devices are up to date, have anti-malware installed, and have the latest definition updates before being allowed to connect to the network. Which of the following should you implement?

Implement a network access control (NAC) solution.

If a user's BYOD device (such as a tablet or phone) is infected with malware, that malware can be spread if that user connects to your organization's network. One way to prevent this event is to use a network access control (NAC) system. How does an NAC protect your network from being infected by a BYOD device?

The NAC remediates devices before allowing them to connect to your network.

Which device deployment model gives businesses significant control over device security while allowing employees to use their devices to access both corporate and personal data?

This is COPE


Ensembles d'études connexes

Asset Protection ch. 14, Asset Protection Ch. 13, Asset Protection CH.11, Asset Protection Ch. 12

View Set

Medical Sociology (Chapter 1, 2 and 8)

View Set

Chapter 1: Introduction to Nursing

View Set

Descriptive statistics, Statistics 2022

View Set