BYOD quiz

BYOD quiz

10th Grade - University

6 Qs

quiz-placeholder

Similar activities

Microsoft MDM & Apps

Microsoft MDM & Apps

10th Grade

10 Qs

Sec+ Book Questions Ch. 5 1/2

Sec+ Book Questions Ch. 5 1/2

University

10 Qs

Networking Concepts

Networking Concepts

12th Grade

10 Qs

Chapter 2 System Overview

Chapter 2 System Overview

University

10 Qs

BTEC DIT C3 LAB - Internal Threats

BTEC DIT C3 LAB - Internal Threats

10th - 11th Grade

10 Qs

Storage Devices

Storage Devices

9th - 11th Grade

10 Qs

Edexcel GCSE Computer Science Topic 3: Computers

Edexcel GCSE Computer Science Topic 3: Computers

12th Grade

10 Qs

BYOD Quiz

BYOD Quiz

KG - 12th Grade

10 Qs

BYOD quiz

BYOD quiz

Assessment

Quiz

Computers

10th Grade - University

Medium

Created by

Ben Scott

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is BYOD important to the enterprise?

Users can take advantage of devices they already own, and the enterprise saves on cost.

Using the latest smart devices and operating systems is critical to success.

There is less security concerns if users operate with their own devices.

The organization does not have to pay for a replacement if a device is lost or stolen.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The most important user security responsibility in a BYOD environment is:

Be aware of cyber attack vectors.

Download only authorized applications.

Not copying sensitive information.

Understand all regulatory requirements appropriate to a particular industry.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tools can IT use to enforce BYOD policy?

MDM applications

Cisco Identity Services Engine

Acceptable use policies

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a benefit of BYOD?

Reduced costs.

Viruses and security issues

Familiarity.

Ownership.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the concerns in converting from a company issued to BYOD environment is that it makes security and device management security more challenging for IT

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should an effective security policy includes?

An overview of corporate and IT goals and objectives

A complete list of mobile devices allowed within the organization.

Definitions of what information is sensitive and who should have access to it.

A detailed description of VPN operations and support procedures.