Which of the following can a security administrator implement on mobile devices that will help prevent unwanted people from viewing the data if the device is left
unattended?
A.
Screen lock
B.
Voice encryption
C.
GPS tracking
D.
Device encryption
Explanation:
Screen-lock is a security feature that requires the user to enter a PIN or a password after a short period of inactivity before they can access the system again. This
feature ensures that if your device is left unattended or is lost or stolen, it will be difficult for anyone else to access your data or applications.
Incorrect Answers:
B: Voice encryption is used to protect audio (voice) transmission. It cannot secure data stored on a mobile device.
C: Global Positioning System (GPS) tracking can be used to identify its location of a stolen device and can allow authorities to recover the device. However, for
GPS tracking to work, the device must have an Internet connection or a wireless phone service over which to send its location information.
D: Device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be
stolen.Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, Indianapolis, 2014, pp 418-419
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp 237 https://www.ukash.com/en-SI/mobile-device-security/