1. A security administrator is developing mobile device hardening standards to protect the confidentiality of data. As part of the baseline, the administrator recommends implementing controls to mitigate risks associated with physical theft.Which of the following would BEST meet the administrator-s requirements?
A) A. Two-factor authentication B) B. BIOS password C) C. Mobile tokenization D) D. Full-disk encryption
2. A user wishes to install applications on a mobile phone via .apk files loaded on a MicroSD card, rather than downloading them from the factory-installed app store. This practice is referred to as:
A) A. back-loading B) B. top-loading C) C. side-loading D) D. front-loading
3. Which of the following methods BEST ensure data will be inaccessible on a mobile device if it is stolen? (Select two.)(Select 2answers)
A) A. Remote wipe B) B. Antivirus requirement C) C. Full device encryption D) D. Remote backup E) E. Anti-malware requirement
4. A technician needs to load several new computers with the company-s customized OS configuration. The technician asks if the systems can be PXE booted. To save the most time, which of the following should be considered if the technician plans to use PXE to boot the systems?
A) A. Multi-boot B) B. Repair installation C) C. Upgrade installation D) D. Image deployment
5. A user who works with sensitive data has received a new computer. The user-s old computer is in good condition, and the manager has asked IT to re-purpose it for a different user.Which of the following describes best practices for re-purposing the computer within the company?
A) A. Install a new drive in the computer and leave the original drive in place. Install the OS from the factory disks and configure. B) B. Destroy the drive with a drill and purchase a new one. Restore the OS from the factory disks and configure. C) C. Configure the user with a new profile on the machine with limited privileges, and hide the original user profile. D) D. Perform a low-level format on the drive. Restore the OS from the factory disks and configure the computer.
Leave a comment