exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 481 discussion

Actual exam question from CompTIA's SY0-701
Question #: 481
Topic #: 1
[All SY0-701 Questions]

A company is implementing a policy to allow employees to use their personal equipment for work. However, the company wants to ensure that only company-approved applications can be installed. Which of the following addresses this concern?

  • A. MDM
  • B. Containerization
  • C. DLP
  • D. FIM
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ffontes89
1 week, 4 days ago
Selected Answer: A
A. MDM (Mobile Device Management)
upvoted 1 times
...
fcb3550
2 weeks ago
Selected Answer: B
Containerization
upvoted 1 times
...
NadirM_18
3 weeks, 1 day ago
Selected Answer: A
Definitely A. I work with MDM software on a daily basis. It restricts what can be installed on the devices and provides the ability to remote wipe if necessary.
upvoted 3 times
...
VincentvdS
2 months ago
Selected Answer: B
I think the keyword in the question is "personal equipment" and therefor only Containerization can be the answer.
upvoted 2 times
...
Anyio
2 months, 3 weeks ago
Selected Answer: A
A. MDM (Mobile Device Management) Explanation: MDM solutions allow organizations to enforce application policies on personal devices (as part of a BYOD policy). With MDM, the company can ensure that only approved applications are installed and used for work purposes. MDM provides application control, policy enforcement, and device monitoring to maintain security while allowing personal devices. Why not the other options? B. Containerization: While it isolates work applications and data from personal ones, it does not inherently restrict which apps can be installed on the device as a whole. C. DLP (Data Loss Prevention): Focuses on preventing unauthorized access or transmission of sensitive data, but it does not control application installations. D. FIM (File Integrity Monitoring): Tracks and monitors changes to files or systems for security purposes but is unrelated to application management.
upvoted 4 times
...
jbmac
3 months, 3 weeks ago
Selected Answer: B
The correct answer is: B. Containerization Explanation: Containerization allows companies to create a secure, isolated environment on employees' personal devices, in which only approved company applications can be installed and used. This ensures that work-related data and applications are separated from personal apps and data, providing a layer of control while still allowing employees to use their own devices. With containerization, the company can enforce security policies, such as allowing only approved applications within the container, and preventing unauthorized apps from being installed.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago