An organization enables BYOD but wants to allow users to access the corporate

An organization enables byod but wants to allow users

This preview shows page 44 - 46 out of 108 pages.

QUESTION 105An organization enables BYOD but wants to allow users to access the corporate email, calendar, and contacts from theirdevices. The data associated with the user’s accounts is sensitive, and therefore, the organization wants to comply with thefollowing requirements: Active full-device encryption Enabled remote-device wipeBlocking unsigned applications Containerization of email, calendar, and contacts Which of the following technical controls would BEST protect the data from attack or loss and meet the above requirements? A.Require frequent password changes and disable NFC. B.Enforce device encryption and activate MAM. C.Install a mobile antivirus application. D.Configure and monitor devices with an MDM. Correct Answer: D Section: (none) Explanation Explanation/Reference:
Image of page 44
QUESTION 106Given the following information about a company’s internal network: User IP space: 192.168.1.0/24Server IP space: 192.168.192.0/25A security engineer has been told that there are rogue websites hosted outside of the proper server space, and those websitesneed to be identified. Which of the following should the engineer do? B Section: (none) Explanation Explanation/Reference: QUESTION 107The Chief Information Officer (CIO) wants to increase security and accessibility among the organization’s cloud SaaSapplications. The applications are configured to use passwords, and two-factor authentication is not provided natively. Which of the following would BEST address the CIO’s concerns? D Section: (none) Explanation Explanation/Reference: QUESTION 108During a security assessment, activities were divided into two phases; internal and external exploitation. The securityassessment team set a hard time limit on external activities before moving to a compromised box within the enterpriseperimeter. Which of the following methods is the assessment team most likely to employ NEXT? A
Image of page 45
Image of page 46

You've reached the end of your free preview.

Want to read all 108 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture