In which of the following mobile device deployment models are employees supplied a chosen device paid for by their company for both professional and personal use?

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Principles of Computer Security Book: Mindtap - Security+ Guide to Network Security Fundamentals

Terms in this set (10)

CYOD
-In CYOD, companies often provide a stipend offset monthly wireless carrier fees.

In his technical job interview, Mohan asks about the company policy regarding smartphones. He is told that employees may choose from a limited list of approved devices, but he must pay for the device himself. The company will provide him with a monthly stipend to offset the cost. Which type of enterprise deployment model does this company support?

MCM
-Mobile Content Management (MCM) supports the creation and subsequent editing and modification of digital content by multiple employees. It can include tracking editing history, version control, indexing, and searching.

Which of the following mobile management technologies supports the creation and subsequent editing and modification of digital content by multiple employees and can also include edit history tracking, version control, indexing, and searching?

Stuxnet
-A worm was discovered that was actively targeting Windows computers that managed large-scale SCADA systems, often found in military installations, oil pipeline control systems, manufacturing environments, and even nuclear power plants. Named Stuxnet, the malware attempted to gain administrative access to other computers through the network to control the SCADA system. It appears that Stuxnet's primary target was nuclear reactors at the nuclear power plant.

John works in a nuclear power plant. He discovered a worm that was actively targeting Windows computers that manage large-scale SCADA systems. The malware attempted to gain administrative access to other computers through the network to control the SCADA system. Which of the following malware can do all this damage?

COPE
-In corporate-owned personally enabled (COPE) models, employees are supplied a chosen device paid for by their company for both professional and personal use.

In which of the following mobile device deployment models are employees supplied a chosen device paid for by their company for both professional and personal use?

GPS tagging
-A risk for mobile devices is GPS tagging (also called geotagging), which adds geographical identification data to media such as digital photos taken on a mobile device. For example, a user who posts a photo on a social media site may inadvertently identify a private location to anyone who can access the photo's geotagging data.

Ramesh is very active on social media. He visits a lot of pages and views a lot of photos. He also uploads most of his photos to social media sites such as Facebook and Instagram. By doing this, he can become a victim of which of the following risks?

Wi-Fi

Sherlin was asked by his team lead about a method of connecting devices that replaces their current wired local area network (LAN). Which of the following should he suggest?

Hotspots
-Because public hotspots are beyond an organization's control, attackers can eavesdrop on the data transmissions and view sensitive information.

Through which of the following mobile connection vulnerabilities can attackers eavesdrop on data transmissions and view sensitive information?

Geolocation
-Geolocation identifies the geographical location of a device. When finding a person carrying a mobile device, geolocation can also identify a close friend's location or display the address of the nearest coffee shop or store.

Which of the following is the process of identifying the geographical location of a mobile device?

Cellular telephony network
-Many mobile devices rely on cellular telephony for connectivity. A cellular telephony network's coverage area is divided into hexagon-shaped cells; in a typical city, the cells measure 10 square miles (26 square kilometers). At the center of each cell is a transmitter that mobile devices in the cell use to send and receive signals. The transmitters are connected through a mobile telecommunications switching office (MTSO) that controls all of the transmitters in the cellular network and serves as the link between the cellular network and the wired telephone world

Which of the following mobile device connection methods has a coverage area divided into hexagon-shaped cell transmitters that can measure up to 10 square miles installed in every city?

MDM
-Mobile device management (MDM) tools allow a device to be managed remotely by an organization. MDM typically involves a server component, which sends out management commands to the mobile devices, and a client component, which runs on the mobile device to receive and implement the management commands. An administrator can then perform OTA updates or change the configuration on one device, groups of devices, or all devices.

Rohan has been appointed as the chief information security officer at a finance company. At a board meeting on "Information Security Policy Design & Enforcement," he proposes a mobile management solution that provides a high degree of control over a device but a lower level of control on the apps. Applying your knowledge of mobile device security, which of the following mobile management technologies should he suggest to fulfill the requirement?

Sets found in the same folder

Network Security

95 terms

LearnSmartProduction

SECURITY+ GUIDE TO NETWORK SECURITY - CH4

50 terms

suli_serratos

Practice Test: Module 04 Endpoint and Application…

10 terms

Filipino_3star

EXAM

70 terms

cbaker938

Other sets by this creator

ACC116 Financial Accounting Chapter 5 homework

11 terms

AlexMaragliano

Financial Accounting

10 terms

AlexMaragliano

Cengage MindTap Practice Test: Module 03 Threats a…

10 terms

AlexMaragliano

Cengage MindTap Practice Test: Module 02 Threat Ma…

10 terms

AlexMaragliano

Other Quizlet sets

American Literature Midterm-Bratkowski

78 terms

a-patterson7

Sociology 105 - Chapter 2 Quiz

15 terms

nexxersPLUS

Story of the Church Final Exam

16 terms

amlewis365

chapter 2 review

16 terms

Anna_Draper4558

What mobile deployment model would give a company provided device that can be used for business and personal use?

BYOD (bring your own device) is undoubtedly the most well-known policy on this list, and the most popular deployment model for businesses. Under a BYOD policy, employees bring their personal devices to the office and use them for work-related tasks.

What type of deployment model's allow users to select the mobile device make and model?

What type of deployment model(s) allow users to select the mobile device make and model? Bring Your Own Device (BYOD) and Choose Your Own Device (CYOD).

Which model of mobile management allows employees to choose from a selection of company approved devices which the company pays for then supports?

In a choose-your-own-device (CYOD) model, the employee is permitted to choose from a selection of approved devices. The company owns the device.

What is BYOD and CYOD?

BYOD allows employees to use their own devices to access office resources; when employees leave, they take their devices with them. CYOD lets employees choose from an approved set of devices, which they either buy on their own or through their employers.