BYOD quiz

BYOD quiz

10th Grade - University

6 Qs

quiz-placeholder

Similar activities

Network Fundamentals-Introduction to Networks Part 2

Network Fundamentals-Introduction to Networks Part 2

9th Grade - University

9 Qs

Chapter 2 System Overview

Chapter 2 System Overview

University

10 Qs

Software - Functions of the Operating System

Software - Functions of the Operating System

5th - 12th Grade

9 Qs

Biometrics-IGCSE ICT

Biometrics-IGCSE ICT

9th - 11th Grade

10 Qs

Spring and Spring boot

Spring and Spring boot

University

10 Qs

11.6.2 - SOHO configuration Facts Factsheet

11.6.2 - SOHO configuration Facts Factsheet

10th Grade

10 Qs

chpt_2 communication  9618  computer Science Quiz

chpt_2 communication 9618 computer Science Quiz

11th Grade

10 Qs

Post-Test (Mikrotik Basic)

Post-Test (Mikrotik Basic)

12th Grade

10 Qs

BYOD quiz

BYOD quiz

Assessment

Quiz

Computers

10th Grade - University

Medium

Created by

Ben Scott

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is BYOD important to the enterprise?

Users can take advantage of devices they already own, and the enterprise saves on cost.

Using the latest smart devices and operating systems is critical to success.

There is less security concerns if users operate with their own devices.

The organization does not have to pay for a replacement if a device is lost or stolen.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The most important user security responsibility in a BYOD environment is:

Be aware of cyber attack vectors.

Download only authorized applications.

Not copying sensitive information.

Understand all regulatory requirements appropriate to a particular industry.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tools can IT use to enforce BYOD policy?

MDM applications

Cisco Identity Services Engine

Acceptable use policies

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a benefit of BYOD?

Reduced costs.

Viruses and security issues

Familiarity.

Ownership.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the concerns in converting from a company issued to BYOD environment is that it makes security and device management security more challenging for IT

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should an effective security policy includes?

An overview of corporate and IT goals and objectives

A complete list of mobile devices allowed within the organization.

Definitions of what information is sensitive and who should have access to it.

A detailed description of VPN operations and support procedures.