Mobile Device Security

Ace your homework & exams now with Quizwiz!

load

It is recommended that ---- testing be performed to ensure that your design or existing infrastructure can support the potentially large number of connections from multiple devices.

Remote lock

What is usually the first step taken in securing a mobile device? This protects a device that has been lost or stolen.

Screen lock

What should be enforced for all mobile devices, should follow corporate password policy, and can implement auto wiping?

Antivirus malware

---- and ---- protection should be employed as widely as possible and kept up-to-date against current threats for mobile devices.

separate

A company-issued smartphone can be repossessed upon the employee's termination; however, sensitive data could still remain, even with factory reset. On the other hand, if an employee uses a personal device for business purposes, up termination of the employee, it is likely some company data remains on the phone despite the companies best efforts to remove them. Storage segmentation should be implemented to help deal with this issue, keeping data in separate, MDM managed containers?

Mobile devices

Access control for what needs to be managed just like access control from wired or wireless desktops and laptops?

Support

Because each device has its own implementation of various functions, the help desk or support organization has a very difficult time being knowledgeable on all aspects of all possible devices that access a corporate network. So, the cost of what for mobile devices are an important consideration?

Mobile devices

Employee termination needs to include termination of accounts on what?

Privacy

Expectations of what and data access should be included in your company policy for personal mobile devices used for business purposes?

encryption

MDM policy should require ---- of data on the device.

strong

MDM policy should require Device locking with a ---- password.

locking

MDM policy should require device ---- automatically after a certain period of inactivity.

remotely

MDM policy should require the capability to ---- lock the device if it is lost or stolen.

remotely

MDM policy should require the capability to ---- wipe the device if it is lost or stolen.

wipe

MDM policy should require the capability to wipe the device automatically after a certain number of failed login attempts.

Enterprise application store

What can a company implement to allow only company-approved applications to be downloaded and used on mobile devices?

GPS

What can be used for tracking device location and assists in the recovery of lost devices?

Separates them

What does storage segmentation in mobile devices do regarding personal data and corporate data and applications? ANSWER STRUCTURE: ---- them

MDM

What is a marketing term for a collective set of commonly employed protection elements associated with mobile devices?

Storage segmentation

What is it called when personal data is separated from corporate data and applications?

Sensitive

jailbroken or rooted mobile devices should not be allowed on your corporations network or allowed to access what kind of data?


Related study sets

Micro Chapter 14 (Mult Choice + TF) matching + (SA) Full multiple choice questions

View Set

Chemistry Chapter 6, Section 1 Review

View Set

Chapter 5 - The project manager, sponsor and other stakeholders

View Set