Description may include the following:
- Connection methods
- Cellular
- WiFi
- Satellite communications (SATCOM)
- Bluetooth
- NFC
- ANT
- Infrared
- USB
- Deployment models
- Bring your own device (BYOD)
- Corporate owned, personally enabled (COPE)
- Choose your own device (CYOD)
- Corporate-owned
- Virtual desktop infrastructure (VDI)
Process/Skill Questions:
- How would an organization ensure that a BYOD device would not compromise their network?
- How can an individual ensure that a BYOD device will not be compromised?
- What security technologies are deployed in WiFi?
- Which connection methods can be used to access the organization remotely?