Domain 2 Questions
- In which one of the following mobile device deployment models does the organization allow employees to use corporate-owned devices for personal use?
A. BYOD
B. CYOD
C. COPE
D. Corporate-owned
- Bruce would like to implement an authentication mechanism that requires that users connecting via mobile devices use a second authentication factor when they are connecting from an unfamiliar IP address. What term best describes this technique?
A. Context-based authentication
B. Role-based authentication
C. Rule-based authentication
D. Device-based authentication
- Rob is tracking down the unauthorized exfiltration of sensitive information from his organization and found suspicious emails sent by an employee to a Gmail address. The emails seem to only contain photos, but Rob suspects that the photos contain sensitive information. What technique might the employee have used to embed sensitive information within a photograph?
A. Cartography
B. Cryptography
C. Steganography
D. Psychology...