401 SEC+ Exam Guaranteed Pass: Multiple
Questions & Correct Answers Designed by
Renowned Educators to Boost Your Grades
Which of the following should Matt, a security administrator, include when encrypting
smartphones? (Select TWO).
A. Steganography images
B. Internal memory
C. Master boot records
D. Removable memory cards
E. Public keys - -correct ans- -Answer: B,D
Explanation:
All useable data on the device should be encrypted. This data can be located on the hard
drive, or removable drives, such as USB devices and memory cards, and on internal
memory.
A bank has recently deployed mobile tablets to all loan officers for use at customer sites.
Which of the following would BEST prevent the disclosure of customer data in the event
that a tablet is lost or stolen?
A. Application control
B. Remote wiping
C. GPS
D. Screen-locks - -correct ans- -Answer: B
Explanation:
Remote wipe is the process of deleting data on a device in the event that the device is
stolen. This is performed over remote connections such as the mobile phone service or the
internet connection and helps ensure that sensitive data is not accessed by unauthorized
people
,A small company has recently purchased cell phones for managers to use while working
outside if the office.
The company does not currently have a budget for mobile device management and is
primarily concerned with deterring leaks if sensitive information obtained by unauthorized
access to unattended phones. Which of the following would provide the solution BEST
meets the company's requirements?
A. Screen-lock
B. Disable removable storage
C. Full device encryption
D. Remote wiping - -correct ans- -Answer: A
Explanation:
Screen-lock is a security feature that requires the user to enter a password after a short
period of inactivity before they can access the system again. This feature ensures that if
your device is left unattended or is lost or stolen, it will be difficult for anyone else to
access your data or applications.
Which of the following can be used on a smartphone to BEST protect against sensitive data
loss if the device is stolen? (Select TWO).
A. Tethering
B. Screen lock PIN
C. Remote wipe
D. Email password
E. GPS tracking
F. Device encryption - -correct ans- -Answer: C,F
Explanation:
C: Remote wipe is the process of deleting data on a device in the event that the device is
stolen.
, This is performed over remote connections such as the mobile phone service or the
internet connection and helps ensure that sensitive data is not accessed by unauthorized
people.
F: Device encryption encrypts the data on the device. This feature ensures that the data on
the device cannot be accessed in a useable form should the device be stolen.
Which of the following controls can be implemented together to prevent data loss in the
event of theft of a mobile device storing sensitive information? (Select TWO).
A. Full device encryption
B. Screen locks
C. GPS
D. Asset tracking
E. Inventory control - -correct ans- -Answer: A,B
Explanation:
A: Device encryption encrypts the data on the device. This feature ensures that the data on
the device cannot be accessed in a useable form should the device be stolen.
B: Screen locks are a security feature that requires the user to enter a PIN or a password
after a short period of inactivity before they can access the system again. This feature
ensures that if your device is left unattended or is lost or stolen, it will be difficult for
anyone else to access your data or applications.
A way to assure data at-rest is secure even in the event of loss or theft is to use:
A. Full device encryption.
B. Special permissions on the file system.
C. Trusted Platform Module integration.
D. Access Control Lists. - -correct ans- -Answer: A
Questions & Correct Answers Designed by
Renowned Educators to Boost Your Grades
Which of the following should Matt, a security administrator, include when encrypting
smartphones? (Select TWO).
A. Steganography images
B. Internal memory
C. Master boot records
D. Removable memory cards
E. Public keys - -correct ans- -Answer: B,D
Explanation:
All useable data on the device should be encrypted. This data can be located on the hard
drive, or removable drives, such as USB devices and memory cards, and on internal
memory.
A bank has recently deployed mobile tablets to all loan officers for use at customer sites.
Which of the following would BEST prevent the disclosure of customer data in the event
that a tablet is lost or stolen?
A. Application control
B. Remote wiping
C. GPS
D. Screen-locks - -correct ans- -Answer: B
Explanation:
Remote wipe is the process of deleting data on a device in the event that the device is
stolen. This is performed over remote connections such as the mobile phone service or the
internet connection and helps ensure that sensitive data is not accessed by unauthorized
people
,A small company has recently purchased cell phones for managers to use while working
outside if the office.
The company does not currently have a budget for mobile device management and is
primarily concerned with deterring leaks if sensitive information obtained by unauthorized
access to unattended phones. Which of the following would provide the solution BEST
meets the company's requirements?
A. Screen-lock
B. Disable removable storage
C. Full device encryption
D. Remote wiping - -correct ans- -Answer: A
Explanation:
Screen-lock is a security feature that requires the user to enter a password after a short
period of inactivity before they can access the system again. This feature ensures that if
your device is left unattended or is lost or stolen, it will be difficult for anyone else to
access your data or applications.
Which of the following can be used on a smartphone to BEST protect against sensitive data
loss if the device is stolen? (Select TWO).
A. Tethering
B. Screen lock PIN
C. Remote wipe
D. Email password
E. GPS tracking
F. Device encryption - -correct ans- -Answer: C,F
Explanation:
C: Remote wipe is the process of deleting data on a device in the event that the device is
stolen.
, This is performed over remote connections such as the mobile phone service or the
internet connection and helps ensure that sensitive data is not accessed by unauthorized
people.
F: Device encryption encrypts the data on the device. This feature ensures that the data on
the device cannot be accessed in a useable form should the device be stolen.
Which of the following controls can be implemented together to prevent data loss in the
event of theft of a mobile device storing sensitive information? (Select TWO).
A. Full device encryption
B. Screen locks
C. GPS
D. Asset tracking
E. Inventory control - -correct ans- -Answer: A,B
Explanation:
A: Device encryption encrypts the data on the device. This feature ensures that the data on
the device cannot be accessed in a useable form should the device be stolen.
B: Screen locks are a security feature that requires the user to enter a PIN or a password
after a short period of inactivity before they can access the system again. This feature
ensures that if your device is left unattended or is lost or stolen, it will be difficult for
anyone else to access your data or applications.
A way to assure data at-rest is secure even in the event of loss or theft is to use:
A. Full device encryption.
B. Special permissions on the file system.
C. Trusted Platform Module integration.
D. Access Control Lists. - -correct ans- -Answer: A