Which of the following BEST meets this need?

Jane, an IT security technician, needs to create a way to secure company mobile devices. Which of the following BEST meets this need?

Jane, an IT security technician, needs to create a way to secure company mobile devices. Which of the following BEST meets this need?

A.
Implement voice encryption, pop-up blockers, and host-based firewalls.

B.
Implement firewalls, network access control, and strong passwords.

C.
Implement screen locks, device encryption, and remote wipe capabilities.

D.
Implement application patch management, antivirus, and locking cabinets.

Explanation:
Screen-lock is a security feature that requires the user to enter a password after a short period of inactivity before they can access the system again. This feature
ensures that if your device is left unattended or is lost or stolen, it will be difficult for anyone else to access your data or applications.
Device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be
stolen. Remote wipe is the process of deleting data on a device in the event that the device is stolen. This is performed over remote connections such as the
mobile phone service or the internet connection and helps ensure that sensitive data is not accessed by unauthorized people.
Incorrect Answers:
A: Voice encryption is used to protect audio (voice) transmission. It cannot secure data stored on a mobile device.
Pop-up blockers prevent websites from opening new browser windows without the users consent. These are often used for advertisements but can also be used to
distribute malicious code.
A host-based firewall is installed on a client system and is used to protect the client system from the activities of the user as well as from communication from the
network or Internet by filtering the type of network traffic that can sent or received by the systems.
B: Firewalls, network access control, and strong passwords would secure the network rather than the mobile device.
Firewalls protect systems from network attacks by filtering the type of network traffic that can sent or received by the systems.
Strong passwords are likely to mitigate risk of the user account being used to access the network. A strong password would be more difficult to crack. It does not
secure the mobile device.
D: Patch management is the process of maintaining the latest source code for applications and operating systems by applying the latest vendor updates. This helps
protect a systems from newly discovered attacks and vulnerabilities.
Antivirus software is used to protect systems against viruses, which are a form of malicious code designed to spread from one system to another, consuming
network resources. Locking cabinets would secure mobile device when they have not been issued to users.

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, Indianapolis, 2014, pp 161-162, 220, 418-419
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp 231- 232, 236, 237, 246



Leave a Reply 0

Your email address will not be published. Required fields are marked *