Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 56 discussion

Actual exam question from Isaca's CISM
Question #: 56
Topic #: 1
[All CISM Questions]

Which of the following would be an information security manager's PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?

  • A. Configuration management
  • B. Mobile application control
  • C. Inconsistent device security
  • D. End user acceptance
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
grandMa
1 month ago
why not D The current MDM is good enough to verify the security gaps with devices & OS version they are running. Security manager can simply use these fools. The actual challenge is to get usersSign Up their personal devices for corporate work where they can't claim privacy
upvoted 1 times
...
peelu
11 months, 1 week ago
Selected Answer: C
Inconsistent device security
upvoted 1 times
...
Viperhunter
12 months ago
Selected Answer: C
In a BYOD environment, users bring their own devices, which may vary widely in terms of security features, configurations, and patch levels. Managing the security of diverse devices, each with its own security posture, presents a significant challenge. Inconsistent device security can lead to vulnerabilities and increase the risk of unauthorized access or data breaches. While options like configuration management (option A), mobile application control (option B), and end-user acceptance (option D) are also important considerations in a BYOD program, addressing the inconsistency in device security is critical for maintaining a secure and resilient mobile environment.
upvoted 1 times
...
Patt70
1 year, 2 months ago
Answer is C. The "inconsistent device security" is one of the biggest challenge for BYOD programme.
upvoted 1 times
...
richck102
1 year, 6 months ago
C. Inconsistent device security
upvoted 1 times
...
mad68
1 year, 6 months ago
Selected Answer: C
n a BYOD program, employees use their personal mobile devices to access enterprise resources, such as email, corporate applications, and data. These devices may not be under the direct control of the enterprise, and therefore, they may not adhere to the same security standards and configurations as company-owned devices.
upvoted 3 times
...
AomineDaiki
1 year, 7 months ago
I was leaning towards C, but I said D mainly because some end users may not want to use their personal cellphones for privacy reasons. Getting every end user to say "yes" may pose be a bit of a problem because they are afraid that the organization may be monitoring everything they do with their cellphones.
upvoted 1 times
...
dedfef
1 year, 8 months ago
Selected Answer: C
correct
upvoted 2 times
...
Antonivs
1 year, 9 months ago
Selected Answer: C
C imho
upvoted 2 times
...
Prospect57
1 year, 10 months ago
It was a tough one between B and C. I went with C because it is more all encompassing of security concerns; not just applications.
upvoted 2 times
...
mohit05
1 year, 11 months ago
B. Mobile application control
upvoted 2 times
Ziggybooboo
1 year, 11 months ago
Agreed
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...