This is the only defense to social engineering attacks.
What is education?
This defines appropriate and inappropriate usage of company resources, assets, and communications.
What is Acceptable Use Policy (AUP)?
NFC (Near Field Communication) is susceptible to one of these attacks.
What is relay attacks, data corruption, and eavesdropping?
Humans have a natural inclination to do this.
What is trust?
This device deployment model gives businesses significant control over device security while allowing employees to use their devices to access both corporate and personal data.
What is corporate-owned personally enabled (COPE) model?
Locking mobile devices to a particular geographical areas is called this.
What is geofencing?
One of the three parts of a social engineering attack.
What is research, development, or exploitation?
This is used to keep sensitive information from getting into the wrong hands if a device is lost or stolen.
What is mobile device management (MDM) infrastructure?
The location where information is stored when you take a picture with your phone.
What is EXIF data?
This is when attackers gather information about the company they are targeting.
What is footprinting?
This prevents insiders from accessing sensitive information stored on the organization's network from their personal devices while still giving them access to the internet.
What is guest wireless?
All apps in the Windows App Store use this for security ?
What is RTAPI?
Phishing is a combination of social engineering and this.
What is spoofing?
This is a solution that ensures that mobile devices are up to date, have anti-malware installed, and have the latest definition updates before being allowed to connect to the network
What is Network Access Control (NAC)?
Removing protections a phone manufacturer has put in place is called this?
What is jailbreaking?