2. Technologies and Tools

Domain 2 Questions

  1. In which one of the following mobile device deployment models does the organization allow employees to use corporate-owned devices for personal use?

    A. BYOD

    B. CYOD

    C. COPE

    D. Corporate-owned

  2. Bruce would like to implement an authentication mechanism that requires that users connecting via mobile devices use a second authentication factor when they are connecting from an unfamiliar IP address. What term best describes this technique?

    A. Context-based authentication

    B. Role-based authentication

    C. Rule-based authentication

    D. Device-based authentication

  3. Rob is tracking down the unauthorized exfiltration of sensitive information from his organization and found suspicious emails sent by an employee to a Gmail ...

Get Security+® Practice Tests now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.