Question
Answered step-by-step

Question1.1.         data at rest are       data in motion are       mobile device is

(TCO 4) Be definition, the _____ moving along a communications path, so any protections must be able to maintain the security of the data along the entire length of that path. (Points : 5)

       None of the above


Question 2.2. (TCO 4) Perhaps the most effective form of at-rest data protection available for mobile devices is the use of _____, which is the process of scrambling information through the use of a mathematical algorithm. (Points : 5)        access controls

       physical security

       encryption

       authentication

Question 3.3. (TCO 4) Bluetooth _____, when turned off, will not prevent you from initiating a connection from your device to another Bluetooth device. It just means that you will have to manually initiate the connection. (Points : 5)        discoverability

       SSID

       broadcasting

       authentication

Question 4.4. (TCO 5) Through a combination of _____ restrictions, the organization may be able to limit the mobile devices to only those devices that have proven security controls. (Points : 5)        quality of service

       access control

       policy and technology

       data flow

Question 5.5. (TCO 5) _____ can be the most powerful tool in protecting a data-centric mobile environment. In fact, it is the most data-centric of all the security mechanisms. (Points : 5)        Encryption

       Data backup

       Authentication

       Quality of service

Question 6.6. (TCO 5) A _____ approach encapsulates the data inside a secure container and allows that container to be sent. The container is there to protect the data no matter what hostile environments they may encounter. (Points : 5)        device-centric

       data-centric

       process-centric

       user-centric

Question 7.7. (TCO 6) Policies is the most common example of which of the following directive controls? (Points : 5)        Directive controls

       Deterrent controls

       Detective controls

       None of the above

Question 8.8. (TCO 6) If the IT department is creating an impression for the attacker that the effort required to circumvent the security controls is far greater than the potential reward, this is categorized as (Points : 5)        directive controls.

       deterrent controls.

       detective controls.

       reactive controls.

Answer & Explanation
Verified Solved by verified expert

et, consectetur adipisc

lestie consequat,

e vel laoreet ac, dict

consectetur adipisci

at, ultrices ac m

lestie consequat, ul

risus ante, dapibus a mol

consectetur adipiscing e

consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur

Unlock full access to Course Hero

Explore over 16 million step-by-step answers from our library

Subscribe to view answer
Step-by-step explanation

at, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ips

entesque dapibussum dolor sit amet, c


o. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam

e vel laoreet a


sum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvi

consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisi

acinia pulvinar t


consectetur adipiscing elit. Nam lacinia pulvinar tortor

ipiscing elit. Nam


icitur laoreet. Nam risus ante, dapibus a molestie consequa

ng elit. Nam


molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lo

ce dui lectus, co


ce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar

cing elit. Nam lacinia


usce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit am

a. Fusce dui lectus, co

Student reviews
67% (3 ratings)