Last Updated on November 8, 2022 by InfraExam
MF Bring Your Own Device Quiz Answers
-
Why is BYOD important to the enterprise?
-
Users can take advantage of devices they already own, and the enterprise saves on cost.
-
Using the latest smart devices and operating systems is critical to success.
-
There is less security concerns if users operate with their own devices.
-
There is less security concerns if users operate with their own devices.
-
The organization does not have to pay for a replacement if a device is lost or stolen.
-
-
The most important user security responsibility in a BYOD environment is:
-
Be aware of cyber attack vectors.
-
Download only authorized applications.
-
Not copying sensitive information.
-
Understand all regulatory requirements appropriate to a particular industry.
-
-
Which tools can IT use to enforce BYOD policy?
-
MDM applications
-
Cisco Identity Services Engine.
-
All of the above
-
Acceptable use policies.
-
-
What is NOT a benefit of BYOD?
-
Reduced costs.
-
Viruses and security issues.
-
Familiarity.
-
Ownership.
-
-
One of the concerns in converting from a company issued to BYOD environment is that it makes security and device management security more challenging for IT.
- True
- False
-
What should an effective security policy includes?
-
All of the above.
-
An overview of corporate and IT goals and objectives.
-
A complete list of mobile devices allowed within the organization.
-
Definitions of what information is sensitive and who should have access to it.
-
A detailed description of VPN operations and support procedures.
-
-
What is not a building block in a BYOD solution?
-
Applications.
-
Workspace Management.
-
Workplace Integration.
-
Secure Mobility.
-
Core Infrastructure.
-
Policy Management.
-
-
List the critical factors for a successful BYOD implementation. (Choose 7)
-
Ensure network performance and reliability.
-
Establish and maintain secure access to corporate network.
-
Implement IT-assisted and self-support model for the devices.
-
Solution must address entire spectrum of use cases.
-
Not revoking access once device is granted access to network.
-
Enforce company usage policies.
-
Maintain visibility and manageability of all devices on the corporate network and beyond.
-
Protecting data and loss prevention.
-