MF Bring Your Own Device Quiz Answers

  1. Why is BYOD important to the enterprise?

    • Users can take advantage of devices they already own, and the enterprise saves on cost.
    • Using the latest smart devices and operating systems is critical to success.
    • There is less security concerns if users operate with their own devices.
    • There is less security concerns if users operate with their own devices.
    • The organization does not have to pay for a replacement if a device is lost or stolen.
  2. The most important user security responsibility in a BYOD environment is:

    • Be aware of cyber attack vectors.
    • Download only authorized applications.
    • Not copying sensitive information.
    • Understand all regulatory requirements appropriate to a particular industry.
  3. Which tools can IT use to enforce BYOD policy?

    • MDM applications
    • Cisco Identity Services Engine.
    • All of the above
    • Acceptable use policies.
  4. What is NOT a benefit of BYOD?

    • Reduced costs.
    • Viruses and security issues.
    • Familiarity.
    • Ownership.
  5. One of the concerns in converting from a company issued to BYOD environment is that it makes security and device management security more challenging for IT.

    • True
    • False
  6. What should an effective security policy includes?

    • All of the above.
    • An overview of corporate and IT goals and objectives.
    • A complete list of mobile devices allowed within the organization.
    • Definitions of what information is sensitive and who should have access to it.
    • A detailed description of VPN operations and support procedures.
  7. What is not a building block in a BYOD solution?

    • Applications.
    • Workspace Management.
    • Workplace Integration.
    • Secure Mobility.
    • Core Infrastructure.
    • Policy Management.
  8. List the critical factors for a successful BYOD implementation. (Choose 7)

    • Ensure network performance and reliability.
    • Establish and maintain secure access to corporate network.
    • Implement IT-assisted and self-support model for the devices.
    • Solution must address entire spectrum of use cases.
    • Not revoking access once device is granted access to network.
    • Enforce company usage policies.
    • Maintain visibility and manageability of all devices on the corporate network and beyond.
    • Protecting data and loss prevention.
Notify of
Inline Feedbacks
View all comments