<< Prev Question Next Question >>

Question 38/77

A security engineer needs to implement an MDM solution that complies with the corporate mobile device policy. The policy states that in order for mobile users to access corporate resources on their devices the following requirements must be met:
* Mobile device OSs must be patched up to the latest release
* A screen lock must be enabled (passcode or biometric)
* Corporate data must be removed if the device is reported lost or stolen Which of the following controls should the security engineer configure? (Select TWO)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (77q)
Question 1: A security analyst receives the configuration of a current V...
Question 2: An organization has been experiencing outages during holiday...
Question 3: A pharmaceutical sales representative logs on to a laptop an...
Question 4: An analyst needs to set up a method for securely transferrin...
Question 5: A user recent an SMS on a mobile phone that asked for bank d...
Question 6: An organization's RPO for a critical system is two hours. Th...
Question 7: An organization has hired a security analyst to perform a pe...
Question 8: A network engineer needs to create a plan for upgrading the ...
Question 9: Which of the following refers to applications and systems th...
Question 10: A network engineer notices the VPN concentrator overloaded a...
Question 11: Which of the following BEST explains the difference between ...
Question 12: An organization's help desk is flooded with phone calls from...
Question 13: A network administrator has been alerted that web pages are ...
Question 14: A Chief Information Security Officer (CISO) is concerned abo...
Question 15: A cybersecurity department purchased o new PAM solution. The...
Question 16: A company is launching a new internet platform for its clien...
Question 17: A security engineer needs to Implement the following require...
Question 18: A user contacts the help desk to report the following: Two d...
Question 19: A malicious actor recently penetration a company's network a...
Question 20: A security administrator currently spends a large amount of ...
Question 21: Local guidelines require that all information systems meet a...
Question 22: An organization wants to implement a third factor to an exis...
Question 23: A workwide manufacturing company has been experiencing email...
Question 24: A security administrator suspects an employee has been email...
Question 25: The following is an administrative control that would be MOS...
Question 26: In which of the following risk management strategies would c...
Question 27: A cybersecurity analyst needs to implement secure authentica...
Question 28: The IT department at a university is concerned about profess...
Question 29: A recently discovered zero-day exploit utilizes an unknown v...
Question 30: A company recently set up an e-commerce portal to sell its p...
Question 31: An organization has implemented a policy requiring the use o...
Question 32: An organization has a growing workforce that is mostly drive...
Question 33: A security analyst needs to determine how an attacker was ab...
Question 34: A company recently moved sensitive videos between on-premise...
Question 35: A security analyst is reviewing the following attack log out...
Question 36: While checking logs, a security engineer notices a number of...
Question 37: Which of the following will MOST likely adversely impact the...
Question 38: A security engineer needs to implement an MDM solution that ...
Question 39: A security analyst needs to be proactive in understand the t...
Question 40: Joe, a user at a company, clicked an email link led to a web...
Question 41: Which of the following are the MOST likely vectors for the u...
Question 42: A technician needs to prevent data loss in a laboratory. The...
Question 43: An organization just experienced a major cyberattack modem. ...
Question 44: A security analyst discovers several .jpg photos from a cell...
Question 45: A cybersecurity administrator has a reduced team and needs t...
Question 46: Which of the following should be put in place when negotiati...
Question 47: A user reports constant lag and performance issues with the ...
Question 48: A small company that does not have security staff wants to i...
Question 49: A company's Chief Information Security Officer (CISO) recent...
Question 50: An organization that is located in a flood zone is MOST like...
Question 51: An analyst visits an internet forum looking for information ...
Question 52: A security analyst is looking for a solution to help communi...
Question 53: A security analyst is reviewing information regarding recent...
Question 54: A security analyst is investigation an incident that was fir...
Question 55: The IT department's on-site developer has been with the team...
Question 56: A vulnerability assessment report will include the CVSS scor...
Question 57: The Chief Security Officer (CSO) at a major hospital wants t...
Question 58: A nuclear plant was the victim of a recent attack, and all t...
Question 59: A cybersecurity analyst reviews the log files from a web ser...
Question 60: Under GDPR, which of the following is MOST responsible for t...
Question 61: Users at organization have been installing programs from the...
Question 62: A security modern may have occurred on the desktop PC of an ...
Question 63: An organization's Chief Security Officer (CSO) wants to vali...
Question 64: A software developer needs to perform code-execution testing...
Question 65: Which of the following organizational policies are MOST like...
Question 66: The manager who is responsible for a data set has asked a se...
Question 67: A security analyst is using a recently released security adv...
Question 68: A user recently entered a username and password into a recru...
Question 69: A security analyst is preparing a threat for an upcoming int...
Question 70: A university with remote campuses, which all use different s...
Question 71: Users at organization have been installing programs from the...
Question 72: Which of the following BEST explains the reason why a server...
Question 73: A recent malware outbreak across a subnet included successfu...
Question 74: An organization needs to implement more stringent controls o...
Question 75: An organization has decided to host its web application and ...
Question 76: A network administrator has been asked to install an IDS to ...
Question 77: A network administrator would like to configure a site-to-si...