Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 438 discussion

Actual exam question from ISC's CISSP
Question #: 438
Topic #: 1
[All CISSP Questions]

An organization is implementing a bring your own device (BYOD) policy. What would be BEST for mitigating the risk of users managing their own devices and potentially bringing in malware?

  • A. Setting up access control lists (ACL) for these devices.
  • B. Installing a firewall on the organization’s primary network.
  • C. Setting up a separate network within the organization’s demilitarized zone (DMZ).
  • D. Setting up a separate, external wired or wireless network dedicated to these devices.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
YesPlease
11 months, 1 week ago
Answer D) Setting up a separate, external wired or wireless network dedicated to these devices. "Many organizations set up a dedicated BYOD network, usually wireless, and this network is the only one that BYOD devices can directly connect to" Page 12: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-114r1.pdf
upvoted 2 times
YesPlease
11 months, 1 week ago
The best option to mitigate risk "for user managed devices" would be not to introduce a potentially infected device to your network to begin with. Remember, BYOD does not mean that the device has to directly connect to the network to be used....it can be used just for company emails and that only requires internet access. A or B won't help detect if a phone is infected. C still introduces a possibly infected device to your network. Remember, you may have other servers (usually web servers) in the DMZ.
upvoted 1 times
...
...
Soleandheel
11 months, 2 weeks ago
D. Setting up a separate, external wired or wireless network dedicated to these devices.
upvoted 1 times
...
cmakiva
1 year, 2 months ago
Selected Answer: C
if you can't access work resources than it's just a guest network and not BYOD
upvoted 3 times
...
Tygrond87
1 year, 6 months ago
Selected Answer: D
This question sucks, If BYOD only need access to internet then D , IF they need access to company then we tunnel those users straight into their own DMZ
upvoted 4 times
jackdryan
1 year, 6 months ago
D is correct
upvoted 1 times
...
...
examprep900
1 year, 7 months ago
this is not a correct question. BYOD devices have access to company resources. If you are going to block their access, what's the point to allowing them to BYOD?
upvoted 3 times
...
Delab202
1 year, 7 months ago
Selected Answer: D
This concept will require a dedicated isolated wireless network to restrict BYOD devices from interacting directly with company resources other than through the VDI solution.
upvoted 1 times
...
yottabyte
1 year, 9 months ago
Selected Answer: D
Example would be creation of a Guest network with internet access only and not allowing access to corporate resources.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...