Section 5.5

10 September 2022
4.7 (114 reviews)
8 test answers

Unlock all answers in this set

Unlock answers (4)
question
Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them. To increase the security of these devices, you want to apply a default set of securityrelated configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is part of a complete solution.)
answer
Configure and apply security policy settings in a mobile device management system & Enroll the devices in a mobile device management system
question
Your organization recently purchased 18 iPad tablets for use by the organization's management team. These devices have iOS preinstalled on them. To increase the security of these devices, you want to apply a default set of securityrelated configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is a part of a complete solution.)
answer
Configure and apply security policy settings in a mobile device management system & Enroll the devices in a mobile device management system
question
Match each mobile device application control term on the right with the appropriate description on the left. Each description may be used once, more than once, or not at all.
answer
Jailbreaking - Allows apps to be installed from sources other than the App Store Sideloading - Allows apps to be installed from sources other than the Windows Store Sandboxing - Prevents a running app from accessing data stored by other running apps Assigned Access - Defines a whitelist of Windows Store applications
question
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and steal data through a VPN connection using the credentials assigned to a vice president in your organization. For security reasons, all individuals in upper management in your organization have unlisted home phone numbers and addresses. However, security camera footage from the vice president's home recorded someone rummaging through her garbage cans prior to the attack. The vice president admitted to writing her VPN login credentials on a sticky note that she subsequently threw away in her household trash. You suspect the attacker found the sticky note in the trash and used the credentials to log in to the network. You've reviewed the vice president's social media pages and you found pictures of her home posted, but you didn't notice anything in the photos that would give away her home address. She assured you that her smart phone was never misplaced prior to the attack. Which security weakness is the most likely cause of the security breach?
answer
Geotagging was enabled on her smartphone
question
Your organization is formulating a bring your own device (BYOD) security policy for mobile devices. Which of the following statements should be considered as you formulate your policy?
answer
You can't use domain-based group policies to enforce security settings on mobile devices.
question
Your organization's security policy specifies that any mobile device (regardless of ownership) that connects to your internal network must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several Windows RT tablets. Which should you do?
answer
Sign up for a Windows Intune account to manage the tablets
question
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloudbased Windows Intune account. One of your sales representatives left her tablet at an airport. The device contains sensitive information and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe?
answer
Admin Portal
question
Your organization provides its sales force with Windows 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in a cloudbased Windows Intune account. One of your sales representatives left his notebook at a customer's site. The device contains sensitive information and you want to change the password to prevent the data from being compromised. Which Intune portal should you use to remotely change the password?
answer
Admin Portal