CYB 140 Wk 2 – Practice: Quiz

0 items
CYB 140 Wk 2 - Practice: Quiz
CYB 140 Wk 2 – Practice: Quiz
$5.00
  • Description

CYB 140 Wk 2 – Practice: Quiz

  1. Question 1

4/4

Under which of the following policies are employees allowed to work with a preapproved set of devices from which the employees choose?

Show answer choices

BYOD

COPE

COBO

CYOD

  1. Question 2

Under which of the following policies are employees allowed to use and manage devices purchased by the organizations?

Show answer choices

BYOD

COPE

COBO

CYOD

  1. Question 3

4/4

In which way is the COBO approach different from the other mobile use approaches?

Show answer choices

It allows employees to use the devices that they are comfortable with and best fits his/her preferences and work purposes.

It allows employees to work with a preapproved set of devices from which the employees choose.

It allows employees to use and manage devices purchased by the organizations.

It allows employees to use and manage an organization’s device running only a single application.

  1. Question 4

4/4

What should be constructed on the fly with each new IoT device connection that would allow IP-based communication to one endpoint?

Show answer choices

Chip-level security

End-to-End encryption

Virtual LAN pipe

Centralize Access Logs

  1. Question 5

4/4

Which type of attack is used to hack an IoT device and direct huge network traffic to a web server, resulting in overloading the server with connections and preventing any connection to accept?

Show answer choices

DDoS

XSS

XCRF

Sniffing

  1. Question 6

4/4

Which of the following policies allows employees to use and manage devices purchased by the organization, but restricts the use of the device for business purposes only?

Show answer choices

COBO policy

CYOD policy

BYOD policy

COPE policy

  1. Question 7

4/4

Which of the following policies allows employees to choose devices (laptops, smartphones, and tablets) from a preapproved set of devices to access company data as per the organization’s access privileges?

Show answer choices

BYOD policy

CYOD policy

COPE policy

COBO policy

  1. Question 10

4/4

Which of the following solutions allow an organization to remotely secure, monitor, manage, and support mobile devices deployed across the organization?

Show answer choices

MAM solutions

MTP solutions

MIM solutions

MDM solutions