Specify where and when mobile devices can be possessed in your acceptable use policy Specify where and when mobile devices can be possessed in your acceptable use policy Enroll devices in a mobile device management system Implement a network access control (NAC) solution Enroll devices in a mobile device management system |
Users take pictures of proprietary processes and procedures Devices with a data plan can e-mail stolen data Devices have no PIN or password configured Anti-malware software is not installed A device containing sensitive data may be lost |
Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them. To increase the security of these devices, you want to apply a default set of security-related configuration settings. What is the best approach to take to accomplish this? (select two) |
Enroll the devices in a mobile device management system Configure and apply security policy settings in a mobile device management system |
Your organization recently purchased 18 iPad tablets for use by the organization’s management team. These devices have iOS pre-installed on them. To increase the security of these devices, you want to apply a default set of security-related configuration settings. What is the best approach to take to accomplish this? (select two) |
Enroll the devices in a mobile device mangement system Configure and apply security policy settings in a mobile device mangement system |
Your organization’s security policy specifies that any mobile device (regardless of ownership) that connects to your internal network must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several Windows RT tablets. Which should you do? |
Sign up for a Microsoft Intune account to manage the tablets |
GPS Wi-Fi triangulation Cell phone tower triangulation IP address resolution |
Most accurate More accurate Less accurate Least accurate |
Your organization has recently purchased 20 tablet devices for the Human Resource department to use for training sessions. You are concerned that these devices could represent a security risk to your network and want to strengthen their security profile as much as possible. Which actions should you take? (select two) |
Implement storage segmentation Enable device encryption |
Which of the following mobile device security consideration will disable the ability to use the device after a short period of inactivity? |
Screen lock |
Which of the following are not reasons to remote wipe a mobile device? |
When the device is inactive for a period of time |
A smart phone was lost at the airport. There is no way to recover the device. Which of the following will ensure data confidentiality on the device? |
Remote wipe |
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Microsoft Intune account. One of your sales representatives left her tablet at an airport. The device contains sensitive information and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe? |
Admin Portal |
Many of the end users in your organization are bringing their own personal mobile devices to work and are storing sensitive data on them. To prevent the data from being compromised, you create a cloud-based Microsoft Intune account and configure mobile device security policies. You now need to apply those security policies to the end uses’ mobile devices. What should you do? (select two) |
Enroll the devices with the Intune service Create a user account for each user who has a managed mobile device |
You are considering using WiFi triangulation to track the location of wireless devices within your organization. However, you have read on the Internet that this type of tracking can produce inaccurate results. What is the most important consideration for getting reliable results when implementing this type of system? |
Signal strength |
The outside sales reps from your country use notebook computers, tablets, and phones to connect to the internal company network. While traveling, they connect their devices to the Internet using airport and hotel networks. You are concerned that these devices will pick up viruses that could spread to your private network. You would like to implement a solution that prevents devices from connecting to your network unless antivirus software and the latest operating system patches have been installed. When a host tries to connect to the network, the host should be scanned to verify its health. If the hose is not healthy, then it should be placed on a quarantine network where it can be remediated. Once healthy, the hose can then connect to the production network. Which solution should you use? |
NAC |
The owner of a hotel has contracted with you to implement a wireless network to provide Internet access for patrons. The owner has asked that you implement security controls such that only paying patrons are allowed to use the wireless network. She wants them to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, they should then be allowed full access to the Internet. If a patron does not provide the correct code, they should not be allowed to access the Internet. Under no circumstances should patrons be able to access the internal hotel network where sensitive data is stored. What should you do? |
Implement a guest network |
Which of the following enterprise wireless configuration strategies best keeps public wireless access separate from private wireless access? |
Configure a guest access WLAN that uses open authentication and that isolates guest WLAN traffic from other clients on the same access point |
15.4 Mobile Device Management
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price