1. Your organization has corporate-owned mobile devices. You are creating security controls to find these devices if...
Question:
1. Your organization has corporate-owned mobile devices. You are creating security controls to find these devices if they are lost or stolen. Which of the following BEST meets this goal?
A. geolocation
B. screen locks
C. storage segmentation
D. geofencing
2. _____ is a connection method for mobile devices also known as 802.11 wireless networks. Usually, we choose from a list of SSIDs (service set identifiers). WPA3 is used for encrypting the network traffic.
A. Wi-Fi
B. NFC (near field communication)
C. Cellular
D. Bluetooth
3. Which of the following deployment models is when an organization gives employees a list of mobile devices to choose from?
A. Corporate-owned
B. BYOD
C. COPE
D. CYOD
4. Which of the following is the MOST likely to put an organization at risk for data exfiltration?
A. firmware OTA (over the air) updates
B. USB OTG (on-the-go)
C. GPS tagging
D. SMS (Short Message Service)
5. Which of the following deployment models is when an organization hosts their employee’s desktop operating systems on a server?
A. CYOD
B. BYOD
C. COPE
D. VDI
6. What is a potential risk of using SMS (Short Message Service), MMS (Multimedia Messaging Service), or RCS (Rich Communication Services)?
A. GPS tagging
B. eavesdropping
C. sideloading
D. carrier unlocking
7. _____ is a connection method for mobile devices that is wireless. We have these tags inside animals, on packaging for products, on shipping containers, on ID badges to enter a building, library books, etc. These chips are very small, usually about the size of a grain of rice.
A. Radio-frequency identification (RFID)
B. USB (Universal Serial Bus)
C. Global Positioning System (GPS)
D. Infrared
8. Which of the following is the MOST likely to put an organization at risk for data exfiltration?
A. GPS tagging
B. mobile device cameras
C. sideloading
D. firmware OTA (over the air) updates
9. This will send a signal to the mobile device to erase all the data.
A. geofencing
B. geolocation
C. remote wipe
D. content management
10. People can use this method to install an app from unknown sources on an Android device.
A. tethering
B. sideloading
C. jailbreaking
D. carrier unlocking
Auditing a business risk appraoch
ISBN: 978-0324375589
6th Edition
Authors: larry e. rittenberg, bradley j. schwieger, karla m. johnston