M2150-662 Free Dumps Study Materials
Question 3: Which of the following actions are common to traditional Endpoint Management and Mobile
Device Management?
A. Power Management.
B. Encryption Management.
C. Device Wipe.
D. All of the above.
Correct Answer: B
Explanation:
/ IBM Endpoint Manager for Security and Compliance Increases endpoint security with continuous
compliance for all endpointsIBM Endpoint Manager for Security and Compliance helps support
endpoint security throughout your organization. Built on IBM Bigfix technology, this software can
help you protect endpoints and assure regulators that you are meeting security compliance
standards.
/ To protect mobile devices as they access more and more sensitive systems-and to protect
organizations from unauthorized or corrupted devices-Endpoint Manager for Mobile Devicesenables
IT to:
*Detect security threats such as rooted or jail-broken devices and automatically take
countermeasures
*(C) Selectively wipe only corporate data such as calendar, email,contacts and enterprise-managed
applications when a device is lost or stolen
*Extend management and security capabilities through integration with IBM Lotus@ Notes@
Traveler, Microsoft Exchange, Samsung SAFE and NitroDesk TouchDown
*(B) Configure and enforce password policies, encryption, virtualprivate network (VPN) access and
camera use in accordance with organizational and public security standards such as the Center for
Internet Security (CIS) Benchmarks
*Automatically identify non-compliant devices
*Control non-compliance by disabling access to enterpriseresources such as email and applications,
or by issuing user notifications until corrective actions are implemented
Reference: IBM Endpoint Manager for Mobile Devices