Learn why device encryption is the BEST control to protect sensitive data on lost company-owned mobile devices, compared to tracking software, passwords, and backups.
Table of Contents
Question
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
A. Device encryption
B. Device tracking software
C. Password/PIN protection
D. Periodic backup
Answer
A. Device encryption
Explanation
A. Device encryption is the most effective control to minimize the risk of unauthorized access to lost company-owned mobile devices. Encrypting the device ensures that even if it falls into the wrong hands, the data remains inaccessible without the decryption key.
Why other options are less effective:
- Device tracking software: While helpful for locating a lost device, it does not prevent unauthorized access to the data.
- Password/PIN protection: Offers a basic level of protection but can be bypassed through various means.
- Periodic backup: Important for data recovery but does not protect against unauthorized access on the lost device.
Isaca Certified Information Systems Auditor CISA certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the Isaca Certified Information Systems Auditor CISA exam and earn Isaca Certified Information Systems Auditor CISA certification.