Geo tagging was enabled on her smart phone your

Info icon This preview shows pages 16–17. Sign up to view the full content.

Geo-tagging was enabled on her smart phone. Your organization is formulating a bring your own device (BYOD) security policy for mobile devices. Which of the following statements should be considered as you formulate your policy? You can’t use domain-based policies to enforce security settings on mobile devices. Your organization’s security policy specifies that any mobile device that connects to your internal network must have Remote Wipe enabled, regardless of ownership. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several Windows RT tablets. Which should you do? Sign up for a Windows Intune account to manage the tablets. One of your sales representatives left her tablet at an airport. The device contains sensitive information, and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe? Admin portal One of your sales representatives left his notebook at a customer’s site. The device contains sensitive information, and you want to change the password to prevent the data from being compromised. Which Intune portal should you use to remotely change the password? Admin portal Section 7.13.8
Image of page 16

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Which of the following are disadvantages to server virtualization? A compromised host system might affect multiple servers Which of the following are disadvantages of server virtualization? A failure in one hardware component could affect multiple servers. You have a development machine that contains sensitive information relative to your business. You are concerned that spyware and malware might be installed while users browse websites, which could compromise your system or pose a confidentiality risk. Which of the following actions would best protect your system? Run the browser within a virtual environment Which of the following is an advantage of a virtual browser? Protects the host operating system from malicious downloads Which of the following are advantages of virtualization? (Select two.) Centralized administration Easy migration of systems to different hardware Flexibility Moving virtual machines between hypervisor hosts Testing Verifying that security controls are working as designed Server consolidation Performing a physical-to-virtual migration (P2V) Sandboxing Isolating a virtual machine from the physical network.
Image of page 17
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern