ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 285 - SY0-601 discussion

Report
Export

A company recently enhanced mobile device configuration by implementing a set of security controls: biometrics, context-aware authentication, and full device encryption. Even with these settings in place, an unattended phone was used by a malicious actor to access corporate data. Which of the following additional controls should be put in place first?

A.
GPS tagging
Answers
A.
GPS tagging
B.
Remote wipe
Answers
B.
Remote wipe
C.
Screen lock timer
Answers
C.
Screen lock timer
D.
SEAndroid
Answers
D.
SEAndroid
Suggested answer: C

Explanation:

According to NIST Special Publication 1800-4B1, some of the security controls that can be used to protect mobile devices include:

Root and jailbreak detection: ensures that the security architecture for a mobile device has not been compromised.

Encryption: protects the data stored on the device and in transit from unauthorized access. Authentication: verifies the identity of the user and the device before granting access to enterprise resources.

Remote wipe: allows the organization to erase the data on the device in case of loss or theft. Screen lock timer: sets a time limit for the device to lock itself after a period of inactivity.

asked 02/10/2024
patricia rosales
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first