exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 124 discussion

Actual exam question from CompTIA's SY0-501
Question #: 124
Topic #: 1
[All SY0-501 Questions]

A systems administrator wants to protect data stored on mobile devices that are used to scan and record assets in a warehouse. The control must automatically destroy the secure container of mobile devices if they leave the warehouse. Which of the following should the administrator implement? (Choose two.)

  • A. Geofencing
  • B. Remote wipe
  • C. Near-field communication
  • D. Push notification services
  • E. Containerization
Show Suggested Answer Hide Answer
Suggested Answer: AE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Figekioki
Highly Voted 3 years, 10 months ago
Shouldn't this be A and B? Remote wipe makes more sense since containerization means separating work from personal data. However, this device is strictly used for work-tasks, and no mention of personal use. So, what is the point of containerization?
upvoted 7 times
20Panda08
3 years, 10 months ago
I was thinking the same thing. I believe the answer is A & B
upvoted 4 times
...
...
PWashko
Most Recent 2 years, 3 months ago
Agreed that it's A and B. This might be another example of having to read the question very carefully. Here's how I read it: These devices are already on use as stated, and it's also stated that there's a container holding the data they want wiped, so containerization is already done. They only need to add A and B.
upvoted 1 times
...
MohammadQ
3 years, 9 months ago
I absolutely hate comptia and their wording. A and B should work since it wants to delete the data on the device but I understand how it can be containerization its just terrible wording
upvoted 1 times
...
ms230000751
3 years, 9 months ago
A and B. Geofencing to identify when the device leaves, and remote wipe to destroy it when it does. Don't be fooled.
upvoted 1 times
...
Samgran
3 years, 9 months ago
Containerization can also be implemented in mobile devices. By running an application in a container, it isolates and protects the application, including any of its data. This is very useful when an organization allows employees to use their own devices. It’s possible to encrypt the container to protect it without encrypting the entire device. Ref: Get Certified Get Ahead. p461
upvoted 1 times
...
ekinzaghi
3 years, 10 months ago
clearly A and B
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago