device_encryption - A user keeps sensitive business files on their smartphone. If the device is stolen, the data must remain unreadable without authentication., facial_recognition - A user wants to unlock their phone hands-free by simply looking at the screen., pin_code - A user prefers a simple numeric entry method for unlocking their phone., fingerprint - A user wants quick access to their device using biometric authentication., pattern_lock - A user wants to draw a specific pattern to unlock their Android device., swipe_lock - A user wants the simplest unlock method, requiring only a gesture to access the phone., configuration_profiles - An organization needs to standardize email settings, Wi-Fi configurations, and security rules across all employee phones., os_updates - A mobile OS vendor releases a security patch that fixes several vulnerabilities. A technician ensures all devices are updated., application_updates - A user’s apps keep crashing due to outdated versions. Updating them restores stability and security., mobile_antivirus - A user downloads apps from third-party stores and wants protection from malicious APK files., mobile_antimalware - Strange ads and unwanted apps appear on a device. A technician installs software designed specifically to remove mobile malware., content_filtering - A parent wants to block access to inappropriate websites on their child's phone., locator_application - A user misplaces their phone. They open a website from another device to locate it via GPS., remote_wipe - A user reports that their smartphone was stolen. The administrator wipes the device remotely to protect company information., remote_backup_application - A user loses their device but easily restores photos and documents on a new phone., failed_log_in_attempts_restrictions - A device locks for 15 minutes after too many incorrect unlock attempts., mdm - A company needs centralized control over device apps, restrictions, and security settings for all corporate phones., byod_policy - An employee wants to use their personal phone at work. The company must enforce security requirements before granting access to internal resources., profile_security_requirements - A company requires all devices accessing corporate data to use encryption, strong passwords, and auto-lock.,
0%
CompTIA A+ 2.8 – Securing Mobile Devices
Share
Share
Share
by
Mviverette
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?