ExamGecko
Question list
Search
Search

Question 399 - CISM discussion

Report
Export

Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?

A.
Mobile application control
Answers
A.
Mobile application control
B.
Inconsistent device security
Answers
B.
Inconsistent device security
C.
Configuration management
Answers
C.
Configuration management
D.
End user acceptance
Answers
D.
End user acceptance
Suggested answer: B

Explanation:

Inconsistent device security is the primary challenge for an information security manager when deploying a bring your own device (BYOD) mobile program in an enterprise because it increases the risk of data breaches and compromises. A BYOD mobile program allows employees to use their personal devices, such as smartphones, tablets, or laptops, to access the organization's network, applications, and data. However, personal devices may have different operating systems, versions, configurations, and security settings than the organization's standard devices. Moreover, personal devices may not be updated regularly, may have unauthorized or malicious apps installed, or may not have adequate protection against malware or theft. Inconsistent device security makes it difficult for the information security manager to enforce and monitor the security policies and controls across all devices, as well as to ensure compliance with the regulatory requirements for data privacy and security. Therefore, inconsistent device security is the correct answer.

https://simplemdm.com/blog/challenges-of-bring-your-own-device-byod-policy/

https://www.timedoctor.com/blog/byod-pros-and-cons/

https://www.ncsc.gov.uk/files/NCSC-Vendor-Security-Assessment.pdf

asked 01/10/2024
shafinaaz hossenny
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first