exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 295 discussion

Actual exam question from Isaca's CISM
Question #: 295
Topic #: 1
[All CISM Questions]

An organization has established a bring your own device (BYOD) program. Which of the following is the MOST important security consideration when allowing employees to use personal devices for corporate applications remotely?

  • A. Mandatory controls for maintaining security policy
  • B. Mobile operating systems support
  • C. Security awareness training
  • D. Secure application development
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
GAAMMC
1 month, 2 weeks ago
Selected Answer: C
The policy has been established, now to make employees aware in order to adjust behaviour.
upvoted 1 times
...
oluchecpoint
9 months ago
Selected Answer: A
A. Mandatory controls for maintaining security policy While all the options listed are important for BYOD security, ensuring that there are mandatory controls in place to maintain security policy is the most critical aspect. BYOD introduces significant security risks because personal devices may not meet the same security standards as corporate devices. Therefore, having strict policies and controls in place is essential to mitigate these risks. These controls can include enforcing encryption, requiring strong authentication methods, monitoring device compliance, and implementing remote wipe capabilities, among others.
upvoted 1 times
...
oluchecpoint
1 year, 1 month ago
A. Mandatory controls for maintaining security policy While all the options listed are important for BYOD security, ensuring that there are mandatory controls in place to maintain security policy is the most critical aspect. BYOD introduces significant security risks because personal devices may not meet the same security standards as corporate devices. Therefore, having strict policies and controls in place is essential to mitigate these risks. These controls can include enforcing encryption, requiring strong authentication methods, monitoring device compliance, and implementing remote wipe capabilities, among others.
upvoted 3 times
...
richck102
1 year, 4 months ago
A. Mandatory controls for maintaining security policy
upvoted 1 times
...
Gr3yGh0sT
1 year, 5 months ago
Selected Answer: A
The correct answer is A. Mandatory controls for maintaining security policy are the most important security consideration when allowing employees to use personal devices for corporate applications remotely. This is because these controls help to ensure that corporate data is protected even when it is accessed on personal devices. Some examples of mandatory controls include: Requiring employees to use strong passwords and multi-factor authentication Encrypting corporate data on personal devices Restricting access to corporate data to authorized employees Implementing a remote wipe feature that can be used to erase corporate data from personal devices if they are lost or stolen.
upvoted 1 times
...
Abhey
1 year, 5 months ago
Selected Answer: A
Correct Answer is A
upvoted 1 times
...
dedfef
1 year, 7 months ago
Selected Answer: A
correct answer is A
upvoted 2 times
...
CarlPTY07
1 year, 7 months ago
Selected Answer: A
Mandatory control is the most important security consideration.
upvoted 1 times
...
Broesweelies
1 year, 9 months ago
Selected Answer: A
A. Mandatory controls for maintaining security policy is the MOST important security consideration when allowing employees to use personal devices for corporate applications remotely. This includes having policies in place for device management, network access, and data encryption, as well as ensuring that employees understand and comply with these policies. The other options (B, C, and D) are also important considerations, but without strong mandatory controls in place, the security of the organization's data and systems may be at risk.
upvoted 3 times
...
baranikumar_v
1 year, 9 months ago
C.Security awareness training You can't enforce any software on BYOD devices. Hence, 'A' is incorrect.
upvoted 2 times
kortcl
1 year, 8 months ago
Not true. The answer should be A You should use containers and MDM to monitor company-controlled applications only. MDM allows policies and protections to be in place for only the applications used by the company. The rest of the phone is not monitored by the organization.
upvoted 4 times
...
...
aokisan
1 year, 10 months ago
Selected Answer: A
need to control devices securely.
upvoted 2 times
Blackitalian3
1 year, 10 months ago
Security Awareness training is always the MOST important security consideration in a BYOD situation. Can't force a person relinquish control of their device. Answer should be C.
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago