
Answer-first summary for fast verification
Answer: Deploy a mobile device management (MDM) solution that enforces security policies, such as mandatory encryption, password protection, and remote wipe capabilities, while also monitoring device compliance with organizational standards.
In a BYOD scenario, deploying a mobile device management (MDM) solution is the most effective approach as it provides a balanced solution that enforces necessary security measures without overly restricting user choice. It allows for the enforcement of security policies like encryption and password protection, and the ability to remotely wipe data if a device is lost or stolen, thereby protecting corporate data. Option A is incorrect because it lacks any enforceable security measures, leaving corporate data vulnerable. Option C is impractical as it severely limits the flexibility that BYOD policies aim to provide. Option D is insufficient because securing data without considering device security leaves a significant gap in the organization's security posture.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your organization has recently adopted a bring-your-own-device (BYOD) policy to enhance employee flexibility and productivity. As the cybersecurity architect, you are tasked with designing a comprehensive security strategy for mobile devices and clients that aligns with the organization's objectives of maintaining high security standards without compromising user convenience. The strategy must address data protection, device security, and compliance with industry regulations. Considering the need for scalability, cost-effectiveness, and minimal impact on user experience, which of the following measures would you recommend as the MOST effective approach? (Choose one)
A
Permit unrestricted use of any personal device for accessing corporate resources, relying solely on user discretion for security practices.
B
Deploy a mobile device management (MDM) solution that enforces security policies, such as mandatory encryption, password protection, and remote wipe capabilities, while also monitoring device compliance with organizational standards.
C
Limit access to corporate resources to a curated list of devices and operating systems, excluding all others to reduce potential security vulnerabilities.
D
Implement a policy that focuses exclusively on securing corporate data at rest and in transit, disregarding the security posture of the devices accessing the data.
No comments yet.