ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 2 - 212-82 discussion

Report
Export

Stephen, a security professional at an organization, was instructed to implement security measures that prevent corporate data leakage on employees' mobile devices. For this purpose, he employed a technique using which all personal and corporate data are isolated on an employee's mobile device.

Using this technique, corporate applications do not have any control of or communication with the private applications or data of the employees.

Which of the following techniques has Stephen implemented in the above scenario?

A.
Full device encryption
Answers
A.
Full device encryption
B.
Geofencing
Answers
B.
Geofencing
C.
Containerization
Answers
C.
Containerization
D.
OTA updates
Answers
D.
OTA updates
Suggested answer: C

Explanation:

Containerization is the technique that Stephen has implemented in the above scenario.

Containerization is a technique that isolates personal and corporate data on an employee's mobile device. Containerization creates separate encrypted containers or partitions on the device, where corporate applications and data are stored and managed. Containerization prevents corporate data leakage on employees' mobile devices by restricting access, sharing, copying, or transferring of data between containers. Containerization also allows remote wiping of corporate data in case of device loss or theft . Full device encryption is a technique that encrypts all the data on a mobile device using a password or a key. Geofencing is a technique that uses GPS or RFID to define geographical boundaries and trigger actions based on the location of a mobile device. OTA (Over-the-Air) updates are updates that are delivered wirelessly to mobile devices without requiring physical connection to a computer.

asked 18/09/2024
Jason Siemens
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first