Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


 How would you lock down a mobile device?



 How would you lock down a mobile device?..

Answer / chaitanya

Another opinion question, and as usual a lot of different potential answers. The baseline for these though would be three key elements: An anti-malware application, a remote wipe utility, and full-disk encryption. Almost all modern mobile devices regardless of manufacturer have anti-malware and remote wipe available for them, and very few systems now do not come with full-disk encryption available as an option directly within the OS.




 

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Computer Security Interview Questions

On a Windows network, why is it easier to break into a local account than an AD account?

1 Answers  


I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?

0 Answers  


What is an easy way to configure a network to allow only a single computer to login on a particular jack?

1 Answers  


You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?

1 Answers  


What is XSS?

1 Answers  


 What is the difference between a Black Hat and a White Hat?

1 Answers  


What is dora process in DHCP and how it works?

0 Answers  


 What is the difference between a vulnerability and an exploit?

1 Answers  


 How would you compromise an “Office Workstation” at a hotel?

1 Answers  


 How would you lock down a mobile device?

1 Answers  


How do you protect your home Wireless Access Point?

1 Answers  


Why are internal threats oftentimes more successful than external threats?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)