Mobility Fundamentals Bring Your Own Device Quiz Answers

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Mobility Fundamentals Bring Your Own Device Quiz Answers
Rate this post

Mobility Fundamentals Bring Your Own Device Quiz Answers

1. Why is BYOD important to the enterprise?

Users can take advantage of devices they already own, and the enterprise saves on cost.*
Using the latest smart devices and operating systems is critical to success.
There is less security concerns if users operate with their own devices.
There is less security concerns if users operate with their own devices.
The organization does not have to pay for a replacement if a device is lost or stolen.

2. The most important user security responsibility in a BYOD environment is:

Be aware of cyber attack vectors.*
Download only authorized applications.
Not copying sensitive information.
Understand all regulatory requirements appropriate to a particular industry.

3. Which tools can IT use to enforce BYOD policy?

MDM applications
Cisco Identity Services Engine.
All of the above*
Acceptable use policies.

4. What is NOT a benefit of BYOD?

Reduced costs.
Viruses and security issues.*
Familiarity.
Ownership.

5. One of the concerns in converting from a company issued to BYOD environment is that it makes security and device management security more challenging for IT.

True*
False

6. What should an effective security policy includes?

All of the above.
An overview of corporate and IT goals and objectives.
A complete list of mobile devices allowed within the organization.
Definitions of what information is sensitive and who should have access to it.*
A detailed description of VPN operations and support procedures.

7. What is not a building block in a BYOD solution?

Applications.
Workspace Management.
Workplace Integration.*
Secure Mobility.
Core Infrastructure.
Policy Management.

8. List the critical factors for a successful BYOD implementation. (Choose 7)

Ensure network performance and reliability.
Establish and maintain secure access to corporate network.
Implement IT-assisted and self-support model for the devices.
Solution must address entire spectrum of use cases.
Not revoking access once device is granted access to network.
Enforce company usage policies.
Maintain visibility and manageability of all devices on the corporate network and beyond.
Protecting data and loss prevention.

Leave a Reply

Time limit is exhausted. Please reload the CAPTCHA.

This site uses Akismet to reduce spam. Learn how your comment data is processed.