exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 258 discussion

Actual exam question from Isaca's CISM
Question #: 258
Topic #: 1
[All CISM Questions]

Which of the following is the BEST way to strengthen the security of corporate data on a personal mobile device?

  • A. Implementing a strong password policy
  • B. Using containerized software
  • C. Mandating use of pre-approved devices
  • D. Implementing multi-factor authentication
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
e891cd1
6 months, 3 weeks ago
B.. Separating Critical Company data and applications from other third party applications and data might be a better approach. Since the enterprise data will be in a secured container.
upvoted 1 times
...
King21
11 months, 2 weeks ago
I think the answer is C. Pre approving personal devices for corporate use can include installation of containers, remote discovery/wipe and other necessary security measures.
upvoted 1 times
...
Hugo1717
1 year, 2 months ago
Selected Answer: B
The correct answer is B. Using containerized software. Explanation: Among the options provided, using containerized software is the best way to strengthen the security of corporate data on a personal mobile device. Containerization involves creating isolated environments on a device to separate corporate data and applications from personal data and apps. B. Using containerized software: Containerization ensures that corporate data and applications are isolated within a secure container on the personal mobile device. This prevents data leakage and minimizes the risk of unauthorized access to corporate information even if the device is compromised.
upvoted 2 times
...
Goseu
1 year, 3 months ago
Selected Answer: D
B is good , but i think its too technical for the exam . I vote D.
upvoted 1 times
POWNED
11 months ago
ISACAS new version of the CISM has increased the technical % of questions on the test. I would disagree and say this is indeed within scope of the study material.
upvoted 3 times
...
...
wello
1 year, 4 months ago
Selected Answer: C
pre-approved devices will be tested and more secure.
upvoted 1 times
karanvp
1 year, 4 months ago
But it is a personal mobile device. Even tested and pre-approved, still the device owner may lost device, install malicious code, etc
upvoted 2 times
...
...
richck102
1 year, 4 months ago
B. Using containerized software
upvoted 1 times
...
DASH_v
1 year, 4 months ago
Selected Answer: B
B. For sure, the question is about "security of corporate data", only B can ensure data not ex filtrated from the device as it is being "contained". Other answers do not necessarily address the request in question.
upvoted 2 times
...
sedardna
1 year, 5 months ago
Selected Answer: D
MFA sin duda
upvoted 1 times
...
mad68
1 year, 5 months ago
Selected Answer: D
D. Implementing multi-factor authentication, not B as in my earlier comment. Implementing multi-factor authentication adds an additional layer of security to the authentication process, requiring users to provide multiple factors of identification to access corporate data on their personal mobile devices. This can include something the user knows (e.g., a password), something the user has (e.g., a mobile device or token), or something the user is (e.g., biometric information). By implementing multi-factor authentication, even if the user's password is compromised, an additional factor is required to gain access to the corporate data, making it significantly more difficult for unauthorized individuals to gain unauthorized access.
upvoted 3 times
...
mad68
1 year, 5 months ago
Selected Answer: B
D. Implementing multi-factor authentication Implementing multi-factor authentication adds an additional layer of security to the authentication process, requiring users to provide multiple factors of identification to access corporate data on their personal mobile devices. This can include something the user knows (e.g., a password), something the user has (e.g., a mobile device or token), or something the user is (e.g., biometric information). By implementing multi-factor authentication, even if the user's password is compromised, an additional factor is required to gain access to the corporate data, making it significantly more difficult for unauthorized individuals to gain unauthorized access.
upvoted 1 times
...
Abhey
1 year, 5 months ago
Selected Answer: B
All of the listed options can strengthen the security of corporate data on a personal mobile device, but using containerized software is the BEST option.
upvoted 2 times
...
Broesweelies
1 year, 9 months ago
Selected Answer: B
B is best.
upvoted 3 times
...
baranikumar_v
1 year, 10 months ago
b.containerised software aka work profile in android platforms
upvoted 2 times
...
del_rjo
1 year, 10 months ago
I think B. "Using containerized software" can enable protection (and keeps monitoring/control) of the security of corporate data, isolating from the personal data.
upvoted 3 times
...
Ziggybooboo
1 year, 11 months ago
MFA in my opinion
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago