ExamGecko
Question list
Search
Search

Question 383 - CISM discussion

Report
Export

Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?

A.
Develop a personal device policy
Answers
A.
Develop a personal device policy
B.
Implement a mobile device management (MDM) solution
Answers
B.
Implement a mobile device management (MDM) solution
C.
Develop training specific to BYOD awareness
Answers
C.
Develop training specific to BYOD awareness
D.
Define control requirements
Answers
D.
Define control requirements
Suggested answer: D

Explanation:

Defining control requirements is the next step to ensure the security policy framework encompasses the new business model because it is a process of identifying and specifying the security measures and standards that are needed to protect the data and applications accessed by the BYOD devices. Defining control requirements helps to establish the baseline security level and expectations for the BYOD strategy, as well as to align them with the business objectives and risks. Therefore, defining control requirements is the correct answer.

https://www.digitalguardian.com/blog/ultimate-guide-byod-security-overcoming-challenges-creating-effective-policies-and-mitigating

https://learn.microsoft.com/en-us/mem/intune/fundamentals/byod-technology-decisions

asked 01/10/2024
Krishan Randitha
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first