Multiple Choice
An organization enables BYOD but wants to allow users to access the corporate email, calendar, and contacts from their devices. The data associated with the user's accounts is sensitive, and therefore, the organization wants to comply with the following requirements: Active full-device encryption Enabled remote-device wipe Blocking unsigned applications Containerization of email, calendar, and contacts Which of the following technical controls would BEST protect the data from attack or loss and meet the above requirements?
A) Require frequent password changes and disable NFC.
B) Enforce device encryption and activate MAM.
C) Install a mobile antivirus application.
D) Configure and monitor devices with an MDM.
Correct Answer:

Verified
Correct Answer:
Verified
Q52: Staff members are reporting an unusual number
Q53: A security analyst has requested network engineers
Q54: A financial consulting firm recently recovered from
Q55: An organization is deploying IoT locks, sensors,
Q56: An organization is in the process of
Q58: A new employee is plugged into the
Q59: A security engineer is designing a system
Q60: An organization is considering the use of
Q61: An organization is improving its web services
Q62: A development team releases updates to an