Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? (Select TWO).
A.
Tethering
B.
Screen lock PIN
C.
Remote wipe
D.
Email password
E.
GPS tracking
F.
Device encryption
Explanation:
C: Remote wipe is the process of deleting data on a device in the event that the device is stolen. This is performed over remote connections such as the mobile
phone service or the internet connection and helps ensure that sensitive data is not accessed by unauthorized people.F: Device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be
stolen.
Incorrect Answers:
A: Device tethering is the process of connecting one device to another over a wireless LAN (Wi- Fi) or Bluetooth connection or by using a cable. This allows the
tethered devices to share an Internet connection. It does not protect the device against data loss in the event of the device being stolen.
B: Screen locks are a security feature that requires the user to enter a PIN or a password after a short period of inactivity before they can access the system again.
This feature ensures that if your device is left unattended or is lost or stolen, it will be a bit difficult for anyone else to access your data or applications. However,
screen locks may have workarounds, such as accessing the phone application through the emergency calling feature.
D: Some email applications allow users to set a password on an email that could be shared with the recipient. This does not protect against sensitive data loss if
the device is stolen.
E: Global Positioning System (GPS) tracking can be used to identify its location of a stolen device and can allow authorities to locate the device. However, for GPS
tracking to work, the device must have an Internet connection or a wireless phone service over which to send its location information.Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, Indianapolis, 2014, pp 418-419
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp 236,