CompTIA Security+ 4.1 Security Operations – Securing Computing Resources

Posted by:

|

On:

|

Securing Computing Resources

1 / 25

Which of the following is the MOST effective method to prevent data leakage through mobile device cameras in sensitive areas?

2 / 25

Which of the following BEST describes the concept of mobile device content management?

3 / 25

Which of the following is the MOST effective method to prevent unauthorized access to corporate data when an employee’s mobile device is connected to an unsecured Wi-Fi network?

4 / 25

Which of the following BEST describes the concept of context-aware authentication for mobile devices?

5 / 25

Which of the following is the MOST secure method for implementing multi-factor authentication on a mobile device?

6 / 25

Which of the following BEST describes the concept of application sandboxing on mobile devices?

7 / 25

Which of the following is a key advantage of using containerization for mobile application security?

8 / 25

Which of the following BEST describes the purpose of application whitelisting on mobile devices?

9 / 25

Which of the following BEST describes the purpose of application blacklisting on mobile devices?

10 / 25

Which of the following is the MOST effective way to mitigate the risk of data exposure when an employee uses their personal mobile device for work?

11 / 25

Which of the following BEST describes the concept of mobile device containerization?

12 / 25

Which of the following is the MOST effective method to prevent unauthorized access to sensitive data on a lost or stolen mobile device?

13 / 25

Which of the following BEST describes the purpose of mobile device GPS tracking in an enterprise environment?

14 / 25

Which of the following is the MOST effective way to prevent unauthorized access to corporate email on a lost or stolen mobile device?

15 / 25

Which of the following is the BEST way to secure communication between a mobile device and a corporate email server?

16 / 25

Which of the following is the MOST secure method for connecting a mobile device to a corporate network from a public Wi-Fi hotspot?

17 / 25

Which of the following is the MOST effective method to ensure that only authorized mobile devices can connect to a corporate wireless network?

18 / 25

Which of the following BEST describes the purpose of mobile device location services in an enterprise environment?

19 / 25

Which of the following BEST describes the purpose of mobile device tethering controls in an enterprise environment?

20 / 25

Which of the following is the MOST secure method for implementing wireless guest access in a corporate environment?

21 / 25

Which of the following is the MOST secure method for implementing wireless access points in a large corporate office?

22 / 25

Which of the following BEST describes the concept of mobile device storage segmentation?

23 / 25

Which of the following is the MOST effective method to prevent data loss when an employee’s mobile device is compromised?

24 / 25

Which of the following BEST describes the concept of geofencing in mobile device security?

25 / 25

Which of the following is the MOST secure method for storing sensitive corporate data on a mobile device?

Your score is

Exit