Your organization recently purchased 30 tablet devices for your traveling sales force. These
devices have Windows RT preinstalled on them.
To increase the security of these devices, you want to apply a default set of securityrelated
configuration settings.
What is the best approach to take to accomplish this? (Select two. Each option is part of a
complete solution.)
answer
Configure and apply security policy settings in a mobile device management system & Enroll the devices in a mobile device management system
question
Your organization recently purchased 18 iPad tablets for use by the organization's management
team. These devices have iOS preinstalled on them.
To increase the security of these devices, you want to apply a default set of securityrelated
configuration settings.
What is the best approach to take to accomplish this? (Select two. Each option is a part of a
complete solution.)
answer
Configure and apply security policy settings in a mobile device management system & Enroll the devices in a mobile device management system
question
Match each mobile device application control term on the right with the appropriate description
on the left. Each description may be used once, more than once, or not at all.
answer
Jailbreaking - Allows apps to be installed from sources other than the App Store
Sideloading - Allows apps to be installed from sources other than the Windows Store
Sandboxing - Prevents a running app from accessing data stored by other running apps
Assigned Access - Defines a whitelist of Windows Store applications
question
Recently, a serious security breach occurred in your organization. An attacker was able to log in
to the internal network and steal data through a VPN connection using the credentials assigned
to a vice president in your organization.
For security reasons, all individuals in upper management in your organization have unlisted
home phone numbers and addresses. However, security camera footage from the vice
president's home recorded someone rummaging through her garbage cans prior to the attack.
The vice president admitted to writing her VPN login credentials on a sticky note that she
subsequently threw away in her household trash. You suspect the attacker found the sticky note
in the trash and used the credentials to log in to the network.
You've reviewed the vice president's social media pages and you found pictures of her home
posted, but you didn't notice anything in the photos that would give away her home address. She
assured you that her smart phone was never misplaced prior to the attack.
Which security weakness is the most likely cause of the security breach?
answer
Geotagging was enabled on her smartphone
question
Your organization is formulating a bring your own device (BYOD) security policy for mobile
devices.
Which of the following statements should be considered as you formulate your policy?
answer
You can't use domain-based group policies to enforce security settings on mobile
devices.
question
Your organization's security policy specifies that any mobile device (regardless of ownership)
that connects to your internal network must have remote wipe enabled. If the device is lost or
stolen, then it must be wiped to remove any sensitive data from it.
Your organization recently purchased several Windows RT tablets. Which should you do?
answer
Sign up for a Windows Intune account to manage the tablets
question
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting
customer sites. You manage these devices by enrolling them in your cloudbased Windows
Intune account.
One of your sales representatives left her tablet at an airport. The device contains sensitive
information and you need to remove it in case the device is compromised.
Which Intune portal should you use to perform a remote wipe?
answer
Admin Portal
question
Your organization provides its sales force with Windows 8.1 tablets to use while visiting
customer sites. You manage these devices by enrolling them in a cloudbased Windows Intune
account.
One of your sales representatives left his notebook at a customer's site. The device contains
sensitive information and you want to change the password to prevent the data from being
compromised.
Which Intune portal should you use to remotely change the password?
answer
Admin Portal
Haven't found what you need?
Search for quizzes and test answers now
Quizzes.studymoose.com uses cookies. By continuing you agree to our cookie policy