
Ultimate access to all questions.
Your organization has recently adopted a bring-your-own-device (BYOD) policy to enhance employee flexibility and productivity. As the cybersecurity architect, you are tasked with designing a comprehensive security strategy for mobile devices and clients that aligns with the organization's objectives of maintaining high security standards without compromising user convenience. The strategy must address data protection, device security, and compliance with industry regulations. Considering the need for scalability, cost-effectiveness, and minimal impact on user experience, which of the following measures would you recommend as the MOST effective approach? (Choose one)
A
Permit unrestricted use of any personal device for accessing corporate resources, relying solely on user discretion for security practices.
B
Deploy a mobile device management (MDM) solution that enforces security policies, such as mandatory encryption, password protection, and remote wipe capabilities, while also monitoring device compliance with organizational standards.
C
Limit access to corporate resources to a curated list of devices and operating systems, excluding all others to reduce potential security vulnerabilities.
D
Implement a policy that focuses exclusively on securing corporate data at rest and in transit, disregarding the security posture of the devices accessing the data.