- Description
CYB 140 Wk 2 – Practice: Quiz
- Question 1
4/4
Under which of the following policies are employees allowed to work with a preapproved set of devices from which the employees choose?
Show answer choices
BYOD
COPE
COBO
CYOD
- Question 2
Under which of the following policies are employees allowed to use and manage devices purchased by the organizations?
Show answer choices
BYOD
COPE
COBO
CYOD
- Question 3
4/4
In which way is the COBO approach different from the other mobile use approaches?
Show answer choices
It allows employees to use the devices that they are comfortable with and best fits his/her preferences and work purposes.
It allows employees to work with a preapproved set of devices from which the employees choose.
It allows employees to use and manage devices purchased by the organizations.
It allows employees to use and manage an organization’s device running only a single application.
- Question 4
4/4
What should be constructed on the fly with each new IoT device connection that would allow IP-based communication to one endpoint?
Show answer choices
Chip-level security
End-to-End encryption
Virtual LAN pipe
Centralize Access Logs
- Question 5
4/4
Which type of attack is used to hack an IoT device and direct huge network traffic to a web server, resulting in overloading the server with connections and preventing any connection to accept?
Show answer choices
DDoS
XSS
XCRF
Sniffing
- Question 6
4/4
Which of the following policies allows employees to use and manage devices purchased by the organization, but restricts the use of the device for business purposes only?
Show answer choices
COBO policy
CYOD policy
BYOD policy
COPE policy
- Question 7
4/4
Which of the following policies allows employees to choose devices (laptops, smartphones, and tablets) from a preapproved set of devices to access company data as per the organization’s access privileges?
Show answer choices
BYOD policy
CYOD policy
COPE policy
COBO policy
- Question 10
4/4
Which of the following solutions allow an organization to remotely secure, monitor, manage, and support mobile devices deployed across the organization?
Show answer choices
MAM solutions
MTP solutions
MIM solutions
MDM solutions