
Answer-first summary for fast verification
Answer: Specify and enforce security requirements for personal devices, including mandatory device registration, multi-factor authentication, data encryption, and regular security audits to ensure compliance with industry standards.
Option B is the best choice because it directly addresses the company's need for security and compliance in a BYOD environment. By specifying and enforcing security requirements for personal devices, the company can mitigate risks associated with data breaches and non-compliance. This approach includes critical measures like device registration, multi-factor authentication, and regular security audits, which are essential for protecting sensitive data on personal devices. It also balances security needs with the flexibility and cost-effectiveness required by the BYOD policy. Options A and C do not fully support the BYOD policy's objectives, while Option D neglects the company's responsibility to protect its data, posing significant security and compliance risks.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your company is transitioning to a bring-your-own-device (BYOD) policy to enhance employee flexibility and productivity. However, the IT security team is concerned about the potential risks to the company's sensitive data. The company operates in a highly regulated industry, requiring strict compliance with data protection standards. Additionally, the solution must be cost-effective and scalable to accommodate future growth. Considering these constraints, which of the following security measures would BEST address the company's concerns while supporting the BYOD policy? (Choose one option.)
A
Implement a comprehensive endpoint protection solution on all company-owned devices only, assuming personal devices will not access sensitive data.
B
Specify and enforce security requirements for personal devices, including mandatory device registration, multi-factor authentication, data encryption, and regular security audits to ensure compliance with industry standards.
C
Restrict access to company resources from personal devices entirely, requiring employees to use company-provided devices for all work-related activities.
D
Allow unrestricted access to company resources from personal devices, relying on employees' discretion to secure their devices and data.
No comments yet.