• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

Which two options are security best practices that help mitigate BYOD risks? (Choose two.)

  • Use wireless MAC address filtering.
  • Decrease the wireless antenna gain level.
  • Keep the device OS and software updated.
  • Only turn on Wi-Fi when using the wireless network.
  • Only allow devices that have been approved by the corporate IT team.
  • Use paint that reflects wireless signals and glass that prevents the signals from going outside the building.
Answers Explanation & Hints:

Many companies now support employees and visitors attaching and using wireless devices that connect to and use the corporate wireless network. This practice is known as a bring-your-own-device policy or BYOD. Commonly, BYOD security practices are included in the security policy. Some best practices that mitigate BYOD risks include the following:Use unique passwords for each device and account.
Turn off Wi-Fi and Bluetooth connectivity when not being used. Only connect to trusted networks.
Keep the device OS and other software updated.
Backup any data stored on the device.
Subscribe to a device locator service with a remote wipe feature.
Provide antivirus software for approved BYODs.
Use Mobile Device Management (MDM) software that allows IT teams to track the device and implement security settings and software controls.

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 18 – 20: Network Defense Group Exam Answers Full 100%

Network Security 1.0 Final Exam Answers Full 100%

Notify of
Inline Feedbacks
View all comments