Social Engineering
BYOD Security
Mobile Devices
100

This is the only defense to social engineering attacks.

What is education?

100

This defines appropriate and inappropriate usage of company resources, assets, and communications.

What is Acceptable Use Policy (AUP)?

100

NFC (Near Field Communication) is susceptible to one of these attacks.

What is relay attacks, data corruption, and eavesdropping? 

200

Humans have a natural inclination to do this.

What is trust?

200

This device deployment model gives businesses significant control over device security while allowing employees to use their devices to access both corporate and personal data.

What is corporate-owned personally enabled (COPE) model?

200

Locking mobile devices to a particular geographical areas is called this.

What is geofencing?

300

One of the three parts of a social engineering attack.

What is research, development, or exploitation?

300

This is used to keep sensitive information from getting into the wrong hands if a device is lost or stolen.

What is mobile device management (MDM) infrastructure?

300

The location where information is stored when you take a picture with your phone.

What is EXIF data?

400

This is when attackers gather information about the company they are targeting.

What is footprinting?

400

This prevents insiders from accessing sensitive information stored on the organization's network from their personal devices while still giving them access to the internet.

What is guest wireless?

400

All apps in the Windows App Store use this for security ?

What is RTAPI?

500

Phishing is a combination of social engineering and this.

What is spoofing?

500

This is a solution that ensures that mobile devices are up to date, have anti-malware installed, and have the latest definition updates before being allowed to connect to the network

What is Network Access Control (NAC)?

500

Removing protections a phone manufacturer has put in place is called this? 

What is jailbreaking?