Users in the sales department perform many of their

Info icon This preview shows pages 14–17. Sign up to view the full content.

Users in the sales department perform many of their daily tasks, such as emailing and creating sales presentations, on company-owned tablets. These tablets contain sensitive information. If one of these tablets is lost or stolen, this information could end up in the wrong hands. The chief information officer wants you to implement a solution that can be used to keep sensitive information from getting into the wrong hands if a device is lost or stolen. Which of the following should you implement? A mobile device management infrastructure
Image of page 14

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Users in the Sales department perform many of their daily tasks, such as emailing and creating sales presentations, on personal tablets. The chief information officer worries that one of these users might also use their tablet to steal sensitive information on the organization’s network. Your job is to implement a solution that can prevent insiders from accessing sensitive information on personal devices? Which of the following should you implement? A guest wireless network that is isolated from your organization’s production network. Section 7.12.10 Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them. To increase the security of these devices, you want to apply a default set of security-related configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is part of a complete solution.) Enroll the devices in a mobile device management system. Configure and apply security policy settings in a mobile device management system. Your organization recently purchased 18 iPad tablets for use by the organization’s management team. These devices have iOS pre-installed on them. To increase security of these devices, you want to apply a default set of security-related configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is part of a complete solution.) Configure and apply security policy settings in a mobile device management system. Enroll the devices in a mobile device management system. Jailbreaking Allows apps to be installed from sources other than the App Store Sideloading Allows apps to be installed from sources other than the Windows Store Sandboxing
Image of page 15
Prevents a running app from accessing data stored by other running apps Assigned Access Defines a whitelist of Windows Store applications You’ve reviewed the vice president’s social media pages. You found pictures of her home posted, but you didn’t notice anything in the photos that would give away her home address. She assured you that her smart phone was never misplaced prior to the attack. Which security weakness is the most likely cause of the security breach?
Image of page 16

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Image of page 17
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern