O'Reilly logo

CompTIA Security+ Certification Guide by Ian Neil

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Answers and explanations

  1. MDM sets and enforces policies to protect the network from mobile devices.
  2. BYOD is where you bring your personally owned device to use in the workplace.
  3. The acceptable use policy and onboarding/offboarding policies need to be agreed upon before you can implement BYOD.
  4. BYOD are personally owned devices, whereas CYOD are company-owned devices. Using CYOD allows the security administrators to remotely wipe the device if it is stolen and can make offboarding very easy as they own the device, so data ownership will never be an issue.
  5. Mobile devices can connect through cellular, wireless, and Bluetooth connections.
  6. Near field communication is used to make a contactless payment; the device must be within 4 cm of the card. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required