exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 624 discussion

Actual exam question from CompTIA's SY0-601
Question #: 624
Topic #: 1
[All SY0-601 Questions]

A security engineer needs to implement an MDM solution that complies with the corporate mobile device policy. The policy states that in order for mobile users to access corporate resources on their devices, the following requirements must be met:

• Mobile device OSs must be patched up to the latest release.
• A screen lock must be enabled (passcode or biometric).
• Corporate data must be removed if the device is reported lost or stolen.

Which of the following controls should the security engineer configure? (Choose two.)

  • A. Containerization
  • B. Storage segmentation
  • C. Posturing
  • D. Remote wipe
  • E. Full-device encryption
  • F. Geofencing
Show Suggested Answer Hide Answer
Suggested Answer: CD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
sujon_london
Highly Voted 1 year, 9 months ago
Selected Answer: CD
If a mobile device does not meet the policy requirements, such as having an outdated OS or not being able to enable a screen lock, it should not be allowed access to corporate resources until it meets these requirements. to the point "posturing" becomes particularly relevant and first priority. Posturing, as part of a Mobile Device Management (MDM) solution, can assess the compliance of mobile devices with the corporate security policy. If a device is found to be non-compliant (e.g., due to an outdated OS or lack of a screen lock), the MDM solution can restrict or deny access to corporate resources until the device is brought into compliance. Posturing: Use posturing checks to verify that mobile devices comply with the policy's requirements, such as having an up-to-date OS and enabling a screen lock.
upvoted 17 times
...
pinkdog
Highly Voted 1 year, 3 months ago
Selected Answer: DE
posturing is not mentioned in the CompTIA sec+ 601 book.
upvoted 10 times
...
AspiringNerd
Most Recent 1 year, 1 month ago
Selected Answer: CD
Posturing refers to the process of assessing and enforcing the security posture or compliance status of mobile devices within an organization's network. Such as up to date OS. Remote Wipe ...wipes remotely??
upvoted 1 times
...
ekiel
1 year, 3 months ago
Selected Answer: DE
will go with DE, as this is one of the security features for end-users computing devices such as mobile device.
upvoted 3 times
...
[Removed]
1 year, 4 months ago
Selected Answer: CE
Posturing refers to the process of evaluating the security posture or compliance status of a device based on various factors such as operating system version, patch level, presence of security settings like screen lock, etc
upvoted 1 times
...
LuckyAro
1 year, 7 months ago
Selected Answer: DE
Remote wipe: This control allows the organization to remotely erase corporate data from a device that is reported lost or stolen. It helps ensure that corporate data is removed from the device in compliance with the policy. Full-device encryption: Full-device encryption is essential to protect the data on the mobile device. It ensures that even if the device is lost or stolen, the data remains secure. Additionally, it's often a prerequisite for enabling secure screen lock methods (passcode or biometric) as mentioned in the policy.
upvoted 2 times
...
Cisco103
1 year, 8 months ago
Selected Answer: CD
CD is correct
upvoted 1 times
...
sirpetey
1 year, 9 months ago
Selected Answer: CD
• Mobile device OSs must be patched up to the latest release. • A screen lock must be enabled (passcode or biometric). Fulfilled by C. Posturing, checks the devices for compliance with policy (Will check if it have updates and screen lock enable) before allowing on the network. • Corporate data must be removed if the device is reported lost or stolen. Obviously D, "remote" "wipe"
upvoted 4 times
...
John_Ferguson
1 year, 9 months ago
Selected Answer: DE
Remote wipe allows the company to wipe the device if it gets lost or stolen. While FDE, coupled with the lock screen requirement, allows for the data to be protected. Posturing doesn't really factor in my opinion since that just lets the company assess whether you've met the other requirements before granting access
upvoted 4 times
John_Ferguson
1 year, 9 months ago
Changing this answer after more research into posturing. As it is one of the specified requirements, posturing would in fact detect the operating system of the device. There is also no requirement for encryption given in the question.
upvoted 11 times
sujon_london
1 year, 9 months ago
Agreed
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...