If the device is encrypted then they can't get at the data. The other answers don't work because what if its turned off or no signal. Remote wipe won't work. Geolocate won't work. Even if you could locate it, then what? The police won't do anything.
Because in case of encryption, they will instead purge/format the drives to sell it on the market, so the first thing a thief does is to not activate any geolocating services, including going online
We use MDM and added a policy to encrypt the devices. so, I can assume that D is covered in A already. Yes, we do face situations where the devices are offline and remote wipe doesn't work, but the devices are already encrypted.
So, I will suggest option A.
LOL it is like chicken and eggs kind of scenario here. You need both A and D and Strong Password + auto-wipe after 3 failed attempts. I hate these types of questions :)
Answer A) Mobile Device Management (MDM) with device wipe
Keep in mind that all new phones should already have hardware encryption...so D is already covered.
MDM solutions offer tons of features such as application level encryption, remote wipe and other policies to secure the phone.
A. Mobile Device Management (MDM) with device wipe
Mobile Device Management (MDM) with the ability to remotely wipe the device is the most effective feature for mitigating against data theft on a corporate mobile device that has been stolen. When a device is stolen, it's critical to ensure that sensitive corporate data doesn't fall into the wrong hands. MDM allows administrators to remotely wipe all data from the stolen device, rendering it useless to the thief and protecting the data.
From the Official Study Guide 9th edition - page 438
Personal electronic device security features can often be managed using a mobile device management (MDM) or unified endpoint management (UEM) solutions. These include device authentiation, full device encryption, communication protection, remote wiping, device lockout, screen locks, GPS and location service management, content management, application control, push notification management .........
Could've been stolen while he was talking on it so it was obviously unlocked. Many videos of people getting phones stolen while talking on them. Tough question. Gpt-3.5 and 4 say MDM
From the Official Study Guide 9th edition - page 410
Some mobile devices, including portable computers, tablets, and mobile phones, may offer
full-device encryption (FDE). Many mobile devices either are pre-encrypted or can be
encrypted by the user/owner. Once a mobile device is encrypted, the user’s data is protected
whenever the screen is locked, which causes the physical data port on the device to be disabled. This prevents unauthorized access to data on the device through a physical cable connection as long as the screen remains locked. Most if not all of the storage media of a device can be encrypted, this is usually a worthwhile feature to enable. However, encryption isn’t a guarantee of protection for data, especially if the device is stolen while unlocked or if the system itself has a known backdoor attack vulnerability.
MDM is also at end of life and about to get deprecated to be replaced by UEM, which combines MDM and EMM (enterprise mobility management)
I THINK A = widely used and looks promising. Some phones support, majority dont support FDE.
also pg 410 ""However, encryption isn’t a guarantee of protection for data, especially if the device is stolen while unlocked or if the system itself has a known backdoor attack vulnerability"
A or D ? If mobile devices are stolen and the thieves open it in their Underground bunker, does it get internet connectivity to wipe the device using MDM? Is it an effective solution to protect? . Maybe you will come to know about this theft 1 week after the incident .
Best ans-D
upvoted 4 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Humongous1593
Highly Voted 2 years, 1 month agoMaximillian
3 months, 1 week agoClay
1 year, 10 months agoSerliop378
1 year, 5 months agojackdryan
1 year, 6 months agoexamprep900
1 year, 7 months agokrassko
Highly Voted 2 years, 1 month agodeeden
Most Recent 3 months, 1 week agoCCNPWILL
5 months, 3 weeks agogjimenezf
9 months, 3 weeks agoYesPlease
11 months agoBoyBastos
1 year, 2 months agonat0220
1 year, 5 months agobabaseun
1 year, 7 months agoTommyZ
1 year, 8 months agoDee83
1 year, 10 months agowedso
1 year, 10 months agoHava_2013
2 years agoJamati
2 years agoikidreamz
1 year, 11 months agobabaseun
1 year, 7 months agofranbarpro
2 years agoCoolwater
2 years ago