-
Q: What is Step 1 of the Top 8 Steps for Mobile Security?A: Enforce Device Passcode Authentication.
-
Q: What is Step 2?A: Monitoring Mobile Device Access and Use.
-
Q: What is Step 3?A: Patching Mobile Devices.
-
Q: What is Step 4?A: Prohibit Unapproved Third-Party Application Stores.
-
Q: What is Step 5?A: Control Physical Access.
-
Q: What is Step 6?A: Evaluate Application Security Compliance (App Assessment).
-
Q: What is Step 7?A: Prepare an Incident Response Plan for Lost or Stolen Mobile Devices.
-
Q: What is Step 8?A: Implement Management and Operational Support.
-
Q: What is the focus of 'App Assessment' in this document?A: Verifying that apps do not leak data or introduce vulnerabilities.
-
Q: What is the 'Containerization' strategy?A: Isolating corporate data/apps from personal data on the device.
Ask a question
Have a doubt or need clarification?
I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.
Thank you!
I have received your message and I shall get back to you shortly.