Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 713 discussion

Actual exam question from Isaca's CISA
Question #: 713
Topic #: 1
[All CISA Questions]

Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD) policy to help prevent data leakage?

  • A. Specify employee responsibilities for reporting lost or stolen BYOD devices.
  • B. Require multi-factor authentication on BYOD devices.
  • C. Require employees to waive privacy rights related to data on BYOD devices.
  • D. Allow only registered BYOD devices to access the network.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
PurpleParrot
1 month, 2 weeks ago
Selected Answer: D
option D ensures mdm and dlp. option B only helps in allowing authorized users but doesn't address data leakage.
upvoted 1 times
...
KAP2HURUF
4 months, 1 week ago
Selected Answer: D
Option D, allowing only registered BYOD devices to access the network, is the most effective recommendation for preventing data leakage. Registering devices enables better control and visibility, allowing the organization to enforce security policies, track device access, and remotely wipe data if necessary. While other options offer some level of protection, they are not as comprehensive: Option A is important for incident response but doesn’t actively prevent data leakage. Option B enhances access security but doesn’t address data stored on the device itself. Option C raises ethical and legal concerns and may not be enforceable.
upvoted 1 times
...
a84n
6 months, 2 weeks ago
Selected Answer: D
Answer D only authorized devices, which have been vetted and meet security standards, are permitted to access the organization's network.
upvoted 1 times
...
SuperMax
1 year, 1 month ago
Selected Answer: B
B. Require multi-factor authentication on BYOD devices. Multi-factor authentication (MFA) adds an extra layer of security to ensure that only authorized users can access company data from their BYOD devices. It typically involves something the user knows (like a password) and something the user has (like a smartphone or a hardware token). This helps protect against unauthorized access even if the device is lost or stolen. While the other options (A, C, and D) may also be important elements of a BYOD policy, they do not directly address data leakage prevention as effectively as implementing multi-factor authentication.
upvoted 2 times
...
Broesweelies
1 year, 3 months ago
Selected Answer: B
B. Require multi-factor authentication on BYOD devices. Requiring multi-factor authentication on BYOD devices adds an extra layer of security that can significantly reduce the risk of unauthorized access and data leakage. It ensures that even if a device is lost or stolen, unauthorized individuals cannot easily gain access to sensitive company data.
upvoted 2 times
...
JONESKA
1 year, 4 months ago
Answer should be B. to use the MFA. option D is a good practice for network security, but it does not specifically address data leakage prevention which what the question is asking.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...