ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 78 - CAS-004 discussion

Report
Export

An organization is considering a BYOD standard to support remote working. The first iteration of the solution will utilize only approved collaboration applications and the ability to move corporate data between those applications. The security team has concerns about the following:

Unstructured data being exfiltrated after an employee leaves the organization

Data being exfiltrated as a result of compromised credentials

Sensitive information in emails being exfiltrated

Which of the following solutions should the security team implement to mitigate the risk of data loss?

A.
Mobile device management, remote wipe, and data loss detection
Answers
A.
Mobile device management, remote wipe, and data loss detection
B.
Conditional access, DoH, and full disk encryption
Answers
B.
Conditional access, DoH, and full disk encryption
C.
Mobile application management, MFA, and DRM
Answers
C.
Mobile application management, MFA, and DRM
D.
Certificates, DLP, and geofencing
Answers
D.
Certificates, DLP, and geofencing
Suggested answer: C

Explanation:

Mobile application management (MAM) is a solution that allows the organization to control and secure the approved collaboration applications and the data within them on personal devices. MAM can prevent unstructured data from being exfiltrated by restricting the ability to move, copy, or share data between applications. Multi-factor authentication (MFA) is a solution that requires the user to provide more than one piece of evidence to prove their identity when accessing corporate data. MFA can prevent data from being exfiltrated as a result of compromised credentials by adding an extra layer of security. Digital rights management (DRM) is a solution that protects the intellectual property rights of digital content by enforcing policies and permissions on how the content can be used, accessed, or distributed. DRM can prevent sensitive information in emails from being exfiltrated by encrypting the content and limiting the actions that can be performed on it, such as forwarding, printing, or copying. Verified

Reference:

https://www.manageengine.com/data-security/what-is/byod.html

https://www.cimcor.com/blog/7-scariest-byod-security-risks-how-to-mitigate

asked 02/10/2024
Shangar Sundaralingam
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first