Jim has been asked to individually identify devices that users are bringing to work as part of a new BYOD policy. The devices will not be joined to a central management system like Active Directory, but he still needs to uniquely identify the systems. Which of the following options will provide Jim with the best means of reliably identifying each unique device?
A. Record the MAC address of each system.
B. Require users to fill out a form to register each system.
C. Scan each system using a port scanner.
D. Use device fingerprinting via a web-based registration system.
Answer: D. Use device fingerprinting via a web-based registration system.
You might also like to view...
The __________ function will change a character argument from lowercase to uppercase.
a. isupper b. toupper c. tolarge d. fromlower e. None of these
If cell A1 contained 10, cell A2 contained 2 and cell A3 contained =A1/A2, what would cell A3 show on the worksheet?
A. =A1/A2 B. =10/2 C. 5 D. =5
COGNITIVE ASSESSMENT You are purchasing a new mobile phone, and are learning about categories of cellular transmissions. You ask the sales person what the ‘G' stands for in the categories 1G, 2G, 3G, and 4G. What does he reply?
A. gigabytes B. generation C. global D. geographic
Describe how security testing differs from ordinary functionality testing. What are the criteria for passing a security test that differ from functional criteria?
What will be an ideal response?