A threat actor was able to use a username and password to log in to a stolen company mobile device. Which of the following provides the best solution to increase mobile data security on all employees' company mobile devices?
I would go with B. Here is the reasoning, for an immediate response to a compromised device, remote swipe may be the best option. But the question asks "What is the best solution to increase mobile data security on all employee's devices?" Implementing FDE across all company devices raises the baseline security for the entire organization ensuring that data on all devices is protected. With compromised credentials a remote swipe might even be too late, if you don't find out fast enough that the device has been stolen.
EfaChux is sooo right. Encryption is only useful if the device is in "rest" state which means its turned off or logged out. In this case the attacker has everything, the last thing we can do is to prevent the attacker afterwards from owning everything with wipein.
This is wrong. Full disk encryption does not protect against malicious access if the attacker has a password. Otherwise, the user would not have access to their own files since they don't have the password.
A remote wipe is the only way out for a stolen device with stolen credentials.
B. Full disk encryption (FDE).
The question was not asking about the single phone that was stolen (in which case a remote wipe may work after the fact); rather, it asks for "the best solution to increase mobile data security on all employees' company mobile devices".
Analysis: The threat actor’s ability to log in suggests the device’s data was accessible post-authentication. Full disk encryption (B) is the best solution, as it ensures all data (corporate and personal) is encrypted and inaccessible without the encryption key, even if credentials are compromised. Containerization (D) is strong but limited to specific data, remote wipe (C) is reactive, and application management (A) doesn’t address data protection directly. For broader mobile data security, encryption is proactive and comprehensive.
Final Answer: B. Full disk encryption
The actual answer is MDM, but not here
A. irrelevant
B. also irrelevant, the actor has already signed in, the encryption is useless at this point
C. is more of reaction rather than preventive.
Either its B even though technically wrong, or D which is usually paired with MDM.. too many questions like this on these "Theory" exams..
Going with D, closest to the actual answer for this situation and scenario
B. Full disk encryption
Explanation:
Full disk encryption ensures that all data on a mobile device is encrypted and cannot be accessed without proper authentication. Even if a device is lost or stolen, the threat actor cannot access the data without the encryption key, adding a critical layer of protection.
Other Options:
A. Application management: Manages apps on devices but does not directly secure the data stored on the device.
C. Remote wipe: Allows erasing data on lost devices but is reactive, requiring the device to be online and detected. It is not a preventative measure for data security.
D. Containerization: Segregates personal and corporate data but doesn't protect the entire device, leaving other areas vulnerable.
The correct answer is:
D. Containerization
Explanation:
Containerization is the best solution to enhance mobile data security in this scenario because it:
Creates a secure, isolated environment for company data and applications on mobile devices.
Ensures that even if a device is compromised, personal and corporate data remain segregated, reducing the risk to sensitive corporate data.
Allows for secure access and management of corporate resources without impacting personal data on the device.
I disagree, the question said company owned device, not (BYOD) device. Hence it should already be restricted, little to no personal data should be on the device.
Remote wipe allows an organization to erase all data on the device remotely, ensuring that even if a threat actor gains physical access and credentials, they cannot access the company data.
The answer is B. The question is what should they do to increase the security o n employees phone. The question is not saying what should they do. with the stolen phone!!
Even if a threat actor gains access to the device, they would still need to bypass additional authentication mechanisms to access the data within the container.
IT administrators can enforce security policies within the container, such as restricting copy/paste functions, disabling screenshots, and requiring strong authentication.
To those picking FDE because you wouldn't wipe all users' phones, this is missing the boat. You are implementing a remote wipe solution, NOT wiping everyones' phones. Given the example provided, I can't see anything but C being correct here.
It says "on ALL employees devices" You aren't going to full wipe every employees mobile devices when only one has been infiltrated. Full disk encryption will increase security going forward.
I'm gonna keep it short here because Ty already explained it perfectly, but it's not B.
"If someone steals a phone AND has your credentials, the device has already been pwned" and remote wiping the stolen device is pretty much your only option. You just have to hope it gets reported and the security team gets to it fast enough. There are other measures they could have taken beforehand that would make the attacker having the username and password less devastating. This would be a big "oops" moment, all you can do is damage control.
This section is not available anymore. Please use the main Exam Page.SY0-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
a4e15bd
Highly Voted 8 months, 2 weeks agoEfaChux
8 months, 1 week agoTmNvrWts
2 months, 1 week agojafyyy
8 months, 1 week agojsmthy
7 months agob82faaf
Highly Voted 8 months, 2 weeks ago9ce65e3
Most Recent 1 week, 2 days agoLinas312
2 weeks, 2 days agoAnyio
3 months agojbmac
3 months, 4 weeks agocab08df
2 months, 3 weeks ago1f2b013
4 months, 1 week ago0ca8ee9
4 months, 2 weeks agoviktorrdlyi
4 months, 3 weeks agoTriBiT
5 months agocyberWoof
5 months, 2 weeks ago3dk1
5 months, 3 weeks ago3dk1
5 months, 3 weeks agoe157c7c
5 months, 4 weeks agoMurtuza
6 months, 1 week agopaytenj10
6 months, 1 week agoc7b3ff0
6 months, 1 week agofamuza77
6 months, 1 week ago