15.4 Mobile Device Management

Your page rank:

Total word count: 944
Pages: 3

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Specify where and when mobile devices can be possessed in your acceptable use policy

Specify where and when mobile devices can be possessed in your acceptable use policy

Enroll devices in a mobile device management system

Implement a network access control (NAC) solution

Enroll devices in a mobile device management system

Users take pictures of proprietary processes and procedures Devices with a data plan can e-mail stolen data Devices have no PIN or password configured Anti-malware software is not installed A device containing sensitive data may be lost

Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them.

To increase the security of these devices, you want to apply a default set of security-related configuration settings.

What is the best approach to take to accomplish this? (select two)

Enroll the devices in a mobile device management system Configure and apply security policy settings in a mobile device management system

Your organization recently purchased 18 iPad tablets for use by the organization’s management team. These devices have iOS pre-installed on them.

To increase the security of these devices, you want to apply a default set of security-related configuration settings.

What is the best approach to take to accomplish this? (select two)

Enroll the devices in a mobile device mangement system Configure and apply security policy settings in a mobile device mangement system

Your organization’s security policy specifies that any mobile device (regardless of ownership) that connects to your internal network must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it.

Your organization recently purchased several Windows RT tablets. Which should you do?

Sign up for a Microsoft Intune account to manage the tablets

GPS

Wi-Fi triangulation

Cell phone tower triangulation

IP address resolution

Most accurate More accurate Less accurate Least accurate

Your organization has recently purchased 20 tablet devices for the Human Resource department to use for training sessions.

You are concerned that these devices could represent a security risk to your network and want to strengthen their security profile as much as possible.

Which actions should you take? (select two)

Implement storage segmentation Enable device encryption

Which of the following mobile device security consideration will disable the ability to use the device after a short period of inactivity?

Screen lock

Which of the following are not reasons to remote wipe a mobile device?

When the device is inactive for a period of time

A smart phone was lost at the airport. There is no way to recover the device. Which of the following will ensure data confidentiality on the device?

Remote wipe

Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Microsoft Intune account.

One of your sales representatives left her tablet at an airport. The device contains sensitive information and you need to remove it in case the device is compromised.

Which Intune portal should you use to perform a remote wipe?

Admin Portal

Many of the end users in your organization are bringing their own personal mobile devices to work and are storing sensitive data on them. To prevent the data from being compromised, you create a cloud-based Microsoft Intune account and configure mobile device security policies.

You now need to apply those security policies to the end uses’ mobile devices.

What should you do? (select two)

Enroll the devices with the Intune service Create a user account for each user who has a managed mobile device

You are considering using WiFi triangulation to track the location of wireless devices within your organization. However, you have read on the Internet that this type of tracking can produce inaccurate results.

What is the most important consideration for getting reliable results when implementing this type of system?

Signal strength

The outside sales reps from your country use notebook computers, tablets, and phones to connect to the internal company network. While traveling, they connect their devices to the Internet using airport and hotel networks.

You are concerned that these devices will pick up viruses that could spread to your private network. You would like to implement a solution that prevents devices from connecting to your network unless antivirus software and the latest operating system patches have been installed.

When a host tries to connect to the network, the host should be scanned to verify its health. If the hose is not healthy, then it should be placed on a quarantine network where it can be remediated. Once healthy, the hose can then connect to the production network.

Which solution should you use?

NAC

The owner of a hotel has contracted with you to implement a wireless network to provide Internet access for patrons.

The owner has asked that you implement security controls such that only paying patrons are allowed to use the wireless network. She wants them to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, they should then be allowed full access to the Internet. If a patron does not provide the correct code, they should not be allowed to access the Internet.

Under no circumstances should patrons be able to access the internal hotel network where sensitive data is stored.

What should you do?

Implement a guest network

Which of the following enterprise wireless configuration strategies best keeps public wireless access separate from private wireless access?

Configure a guest access WLAN that uses open authentication and that isolates guest WLAN traffic from other clients on the same access point

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending