ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 183 - SY0-601 discussion

Report
Export

A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen.Which of the following would BEST meet these requirements? (Select TWO).

A.
Full-device encryption
Answers
A.
Full-device encryption
B.
Network usage rules
Answers
B.
Network usage rules
C.
Geofencing
Answers
C.
Geofencing
D.
Containerization
Answers
D.
Containerization
E.
Application whitelisting
Answers
E.
Application whitelisting
F.
Remote control
Answers
F.
Remote control
Suggested answer: D, E

Explanation:

MDM solutions emerged to solve problems created by BYOD. With MDM, IT teams can remotely wipe devices clean if they are lost or stolen. MDM also makes the life of an IT administrator a lot easier as it allows them to enforce corporate policies, apply software updates, and even ensure that password protection is used on each device. Containerization and application whitelisting are two features of MDM that can help retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen. Containerization is a technique that creates a separate and secure space on the device for work- related data and applications. This way, personal and corporate data are isolated from each other, and IT admins can manage only the work container without affecting the user’s privacy. Containerization also allows IT admins to remotely wipe only the work container if needed, leaving the personal data intact.

Application whitelisting is a technique that allows only authorized applications to run on the device. This way, IT admins can prevent users from installing or using malicious or unapproved applications that might compromise the security of corporate data. Application whitelisting also allows IT admins to control which applications can access corporate resources, such as email servers or cloud storage.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.office1.com/blog/byod-vs-mdm

asked 02/10/2024
Hernan Rojas
48 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first