ExamGecko
Question list
Search
Search

Related questions











Question 444 - CISA discussion

Report
Export

Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD) policy to help prevent data leakage?

A.
Require employees to waive privacy rights related to data on BYOD devices.
Answers
A.
Require employees to waive privacy rights related to data on BYOD devices.
B.
Require multi-factor authentication on BYOD devices,
Answers
B.
Require multi-factor authentication on BYOD devices,
C.
Specify employee responsibilities for reporting lost or stolen BYOD devices.
Answers
C.
Specify employee responsibilities for reporting lost or stolen BYOD devices.
D.
Allow only registered BYOD devices to access the network.
Answers
D.
Allow only registered BYOD devices to access the network.
Suggested answer: B

Explanation:

The best recommendation to include in an organization's bring your own device (BYOD) policy to help prevent data leakage is to require multi-factor authentication on BYOD devices. BYOD is a practice that allows employees to use their own personal devices, such as smartphones, tablets, or laptops, to access the organization's network, data, and systems. Data leakage is a risk that involves the unauthorized or accidental disclosure or transfer of sensitive or confidential data from the organization to external parties or devices. Multi-factor authentication is a security measure that requires users to provide two or more pieces of evidence to verify their identity and access rights, such as passwords, tokens, biometrics, or codes. Multi-factor authentication can help prevent data leakage by reducing the likelihood of unauthorized access to the organization's data and systems through BYOD devices, especially if they are lost, stolen, or compromised.The other options are not as effective as requiring multi-factor authentication on BYOD devices, because they either do not prevent data leakage directly, or they are reactive rather than proactive measures.Reference:CISA Review Manual (Digital Version)1, Chapter 5, Section 5.2.3

asked 18/09/2024
Francisco Julian Mota Fraile
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first