List of questions
Related questions
Question 398 - CAS-004 discussion
After installing an unapproved application on a personal device, a Chief Executive Officer reported an incident to a security analyst. This device is not controlled by the MDM solution, as stated in the BYOD policy. However, the device contained critical confidential information. The cyber incident response team performed the analysis on the device and found the following log:
Which of the following is the most likely reason for the successful attack?
A.
Lack of MDM controls
B.
Auto-join hotspots enabled
C.
Sideloading
D.
Lack of application segmentation
Your answer:
0 comments
Sorted by
Leave a comment first