Learn how to effectively prevent sensitive corporate data leakage from personal mobile devices accessing corporate applications. Discover the best practices and solutions for mobile data security.
Table of Contents
Question
Which of the following would BEST prevent the potential leakage of sensitive corporate data from personal mobile devices accessing corporate applications?
A. Limiting access and capabilities when connecting to the Internet
B. Creating a separate secure partition on the devices
C. Monitoring employee connections to the corporate network
D. Requiring employees to sign acknowledgment of an acceptable use policy
Answer
B. Creating a separate secure partition on the devices
Explanation
Analysis of Options to Prevent Data Leakage from Mobile Devices:
A. Limiting internet access and capabilities: This may help prevent malware but does little to stop intentional or unintentional data leakage through approved channels.
B. Creating a secure partition: This can effectively isolate corporate applications and data from personal use, mitigating the risk of leakage.
C. Monitoring employee connections: While helpful for detecting suspicious activity, it doesn’t prevent data leakage itself.
D. Acceptable use policy: Policies set expectations but don’t technically prevent data leakage.
Recommendation:
Option B, creating a separate secure partition on the devices, is the most effective solution as it isolates corporate data and applications, minimizing the risk of data leakage due to personal use or device compromise.
Isaca Certified Information Systems Auditor CISA certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the Isaca Certified Information Systems Auditor CISA exam and earn Isaca Certified Information Systems Auditor CISA certification.