Mobile device security and compliance regulations can be as hard to pin down as a strong
connection for your smartphone. Test your knowledge of risk areas and compliance rules in this
1. True or False: Every month, more than 13 million mobile phones are left in taxis in large
cities throughout the U.S. and Europe.
2. This is the unauthorized download of data from a computer to a small device with storage
capacity, such as a flash drive, iPhone, iPod or other MP3 player. What is it?
3. This client/server protocol and software enables communication between remote and central
servers for authentication and authorization of dial-in users. What is it?
4. Which wireless protocol is more secure, Wired Equivalent Privacy (WEP) or Wi-Fi Protected
5. You can create an isolated wireless network by adding a different SSID to an access point as
a simple way to improve security. What does SSID stand for?
6. Allowing workers to connect to an organization's servers using a wireless network introduces
a host of risks. Most security experts recommend the use of a mobile ______, a network
configuration in which mobile devices access an intranet securely while moving from one physical
location to another. What is it?
7. True or False: If you don't protect the financial data used in commercial transactions on
mobile devices, you could be subject to a $10,000 fine.
8. If a mobile device is lost, mobile compliance regulations may require that a company
A) The device was encrypted
B) The device never accessed a customer records database
9. A _______ portal can be used to redirect all requests from unknown clients on a wireless
network to a special Web page where users must authenticate themselves with valid credentials
before they gain access to the Internet. What is it?
10. True or False: When you work for a privately held company, your mobile device policies must
comply with Sarbanes-Oxley (SOX) regulations.