Which two options are security best practices that help mitigate BYOD risks? (Choose two.)

IT Questions BankCategory: CCNA CyberOpsWhich two options are security best practices that help mitigate BYOD risks? (Choose two.)

Which two options are security best practices that help mitigate BYOD risks? (Choose two.)

  • Use paint that reflects wireless signals and glass that prevents the signals from going outside the building.
  • Keep the device OS and software updated.
  • Only allow devices that have been approved by the corporate IT team.
  • Only turn on Wi-Fi when using the wireless network.
  • Decrease the wireless antenna gain level.
  • Use wireless MAC address filtering.

Explanation: Many companies now support employees and visitors attaching and using wireless devices that connect to and use the corporate wireless network. This practice is known as a bring-your-own-device policy or BYOD. Commonly, BYOD security practices are included in the security policy. Some best practices that mitigate BYOD risks include the following:
Use unique passwords for each device and account.
Turn off Wi-Fi and Bluetooth connectivity when not being used. Only connect to trusted networks.
Keep the device OS and other software updated.
Backup any data stored on the device.
Subscribe to a device locator service with a remote wipe feature.
Provide antivirus software for approved BYODs.
Use Mobile Device Management (MDM) software that allows IT teams to track the device and implement security settings and software controls.

Exam with this question: Modules 18 - 20: Network Defense Group Exam
Exam with this question: CCNA Cyber Ops Practice Final Exam Answers
Exam with this question: Network Security Final Exam Answers
Exam with this question: Checkpoint Exam: Principles, Practices, and Processes of Network Defense

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x