ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 15 - 112-51 discussion

Report
Export

Amber is working as a team lead in an organization. She was instructed to share a policy document with all the employees working from remote locations and collect them after filling. She shared the files from her mobile device to the concerned employees through the public Internet. An unauthorized user accessed the file in transit, modified the file, and forwarded it to the remote employees.

Based on the above scenario, identify the security risk associated with mobile usage policies.

A.
Lost or stolen devices
Answers
A.
Lost or stolen devices
B.
Infrastructure issues
Answers
B.
Infrastructure issues
C.
Improperly disposing of devices
Answers
C.
Improperly disposing of devices
D.
Sharing confidential data on an unsecured network
Answers
D.
Sharing confidential data on an unsecured network
Suggested answer: D

Explanation:

Sharing confidential data on an unsecured network is a security risk associated with mobile usage policies. Mobile devices are often used to access and transmit sensitive information over public or untrusted networks, such as WiFi hotspots, cellular networks, or Bluetooth connections. This exposes the data to interception, modification, or redirection by malicious actors who may exploit mobile security vulnerabilities or use network-based attacks, such as man-in-the-middle, spoofing, or sniffing. To prevent this risk, mobile users should follow best practices such as using encryption, VPN, certificate pinning, and secure protocols to protect the data in transit. They should also avoid sending or receiving sensitive data over unsecured networks or applications, and verify the identity and integrity of the endpoint servers before establishing a connection.

Reference:

The 9 Most Common Security Threats to Mobile Devices in 2021, Auth0, June 25, 2021

7 Mobile App Security Risks and How to Mitigate Them, Cypress Data Defense, July 10, 2020

The Latest Mobile Security Threats and How to Prevent Them, Security Intelligence, February 19, 2019

asked 18/09/2024
Martin Ng
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first