An organization enables BYOD but wants to allow users to access the corporate email, calendar, and contacts from their devices. The data associated with the user's accounts is sensitive, and therefore, the organization wants to comply with the following requirements: Active full-device encryption Enabled remote-device wipe Blocking unsigned applications Containerization of email, calendar, and contacts Which of the following technical controls would BEST protect the data from attack or loss and meet the above requirements?
A) Require frequent password changes and disable NFC.
B) Enforce device encryption and activate MAM.
C) Install a mobile antivirus application.
D) Configure and monitor devices with an MDM.
Correct Answer:
Verified
Q51: An architect was recently hired by a
Q52: A software development manager is running a
Q53: A company contracts a security engineer to
Q54: A new cluster of virtual servers has
Q55: While attending a meeting with the human
Q57: A security analyst sees some suspicious entries
Q58: A network engineer is attempting to design-in
Q59: A security engineer is working with a
Q60: Legal counsel has notified the information security
Q61: An information security manager is concerned that
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents