BYOD quiz

BYOD quiz

10th Grade - University

6 Qs

quiz-placeholder

Similar activities

CNET251 Chapt 5 - Developing the Security Program

CNET251 Chapt 5 - Developing the Security Program

University

10 Qs

Digital Technology Careers Quiz

Digital Technology Careers Quiz

10th Grade - University

10 Qs

Online Systems Quiz

Online Systems Quiz

12th Grade

10 Qs

Remote Management Organisational Policies

Remote Management Organisational Policies

11th Grade - Professional Development

10 Qs

Hardware and Software Deployment

Hardware and Software Deployment

University

11 Qs

IoT internet of thing

IoT internet of thing

12th Grade

10 Qs

Computer Network

Computer Network

University

10 Qs

BYOD quiz

BYOD quiz

Assessment

Quiz

Computers

10th Grade - University

Medium

Created by

Ben Scott

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is BYOD important to the enterprise?

Users can take advantage of devices they already own, and the enterprise saves on cost.

Using the latest smart devices and operating systems is critical to success.

There is less security concerns if users operate with their own devices.

The organization does not have to pay for a replacement if a device is lost or stolen.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The most important user security responsibility in a BYOD environment is:

Be aware of cyber attack vectors.

Download only authorized applications.

Not copying sensitive information.

Understand all regulatory requirements appropriate to a particular industry.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tools can IT use to enforce BYOD policy?

MDM applications

Cisco Identity Services Engine

Acceptable use policies

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a benefit of BYOD?

Reduced costs.

Viruses and security issues

Familiarity.

Ownership.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the concerns in converting from a company issued to BYOD environment is that it makes security and device management security more challenging for IT

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should an effective security policy includes?

An overview of corporate and IT goals and objectives

A complete list of mobile devices allowed within the organization.

Definitions of what information is sensitive and who should have access to it.

A detailed description of VPN operations and support procedures.