Which of the following technologies can be used to secure mobile devices and their data? (Select TWO).
A. Protective screen
B. Remote wipe
C. Physical lock
D. Locator
E. Passcode lock
CompTIA exam questions
Which of the following technologies can be used to secure mobile devices and their data? (Select TWO).
A. Protective screen
B. Remote wipe
C. Physical lock
D. Locator
E. Passcode lock
Which of the following will help limit unauthorized access to a mobile device?
A. Remote wipes
B. Screen locks
C. Geotracking
D. Antivirus software
An employee at a company lost their mobile device that contains proprietary information. Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information?
A. Lock screen pattern
B. Cancel mobile service
C. Remote wipe
D. Six character password
Which of the following features would be BEST used to recover a lost mobile device?
A. Remote backup application
B. Remote wipe
C. Locator application
D. RFID chip
What type of technology is used when pairing devices such as headsets to a smartphone?
A. Bluetooth
B. Exchange
C. Locator application
D. Remote wipe
Which of the following would be the BEST means of maintaining data security for a mobile device that has been lost or stolen?
A. Login attempt restrictions
B. Locator service
C. Remote wipe
D. Passcode lock
A user realizes they left their mobile phone in a taxi minutes after the car departs. Which of the following should be done to BEST ensure none of the private data on the phone is accessed?
A. Passcode Lock
B. GPS Tracking
C. Remote Backup
D. Remote Wipe
Which of the following methods of securing mobile devices will prevent data loss due to corruption?
A. Enforce pass code locks
B. Install location monitoring application
C. Perform remote wipe after failed login
D. Perform remote application back-up
Which of the following software types would need to be installed on a mobile device to help prevent data from being viewed if the device is lost?
A. Remote wipe
B. Antivirus
C. GPS locator
D. Remote backup application
Which of the following is the BEST option to prevent data breaches on lost mobile devices?
A. Install a locator application on the mobile device so that it can be traced.
B. Apply a restriction to lock the device after a certain number of failed login attempts.
C. Configure the device to remote wipe as soon as it is reported lost.
D. Utilize the fingerprint scanner and passcode for multifactor authentication.