exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 977 discussion

Actual exam question from CompTIA's SY0-501
Question #: 977
Topic #: 1
[All SY0-501 Questions]

A security analyst is implementing mobile device security for a company. To save money, management has decided on a BYOD model. The company is most concerned with ensuring company data will not be exposed if a phone is lost or stolen. Which of the following techniques BEST accomplish this goal? (Choose two.)

  • A. Containerization
  • B. Full device encryption
  • C. Geofencing
  • D. Remote wipe
  • E. Application management
  • F. Storage segmentation
Show Suggested Answer Hide Answer
Suggested Answer: BD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
eldaulo
Highly Voted 4 years, 5 months ago
This is not the correct answer, It should either be, A and F | or | A and E Containerization, and Storage Segmentation Storage Segmentation and Application MAnagement. You cannot force install on personal phones (BYOD).
upvoted 7 times
xsp
4 years, 5 months ago
+1 to this. Full disk encryption is not possible for BYOD. Ask yourself would you allow your organization to FDE your device? Knowing that it is personal and you have personal files stored in it? Also for a BYOD deployment, it is either you isolate the application or data via (Containerization) or create a separate segment, one for the corporate data which is yes encrypted and one for the personal space which belongs to the owner of the device. FDE will only be advisable if the deployment is company owned, COPE or CYOD.
upvoted 4 times
exiledwl
4 years, 5 months ago
I asked professor messer on his website if FDE can be applied to BYOD and he said this https://pasteboard.co/JGBGgB2.png The question is asking for the best methods to ensure company is not stolen if the device is lost so I think we can put the feelings of the corporate slaves aside and implement both FDE and Remote Wipe. Provided answers are correct imo.
upvoted 18 times
KingofOutlets
4 years, 2 months ago
I worked with AirWatch -Vmware workspace one, FDE was configurable for BYOD Android and iOS. For healthcare, this is the industry best pratice.
upvoted 3 times
KenCW
3 years, 11 months ago
I agree. My company using AirWatch and now its change name to Intelligent Hub from VMware.
upvoted 1 times
...
...
...
...
...
fonka
Most Recent 3 years, 10 months ago
We use containerization to isoleate the company data from personal data,but to ensure security we add encryption so that no one is able to dycrptet this solution. Moreover remote wipe out is also help to collect the data befote it falls in the hand s of thebadveaersr so the given answer is right
upvoted 1 times
...
nubian
3 years, 11 months ago
A & D should be the correct answers. I use BYOD at my job and company resources are containerized using the Microsoft Company Portal app. To get to any application in the company portal on your device, you have to MFA sign in. Since the device is enrolled on Microsoft Intune prior to letting users access their company profile in the portal, I am able to delete or remote wipe a compromised device if reported to the service desk from MS Intune Admin. Immediately this is done, the user cannot access company data on their device.
upvoted 1 times
nubian
3 years, 11 months ago
Took my exams today, passed 812! Know the concepts of what you are working with. Good luck to the rest of y'all still studying for your exams.
upvoted 3 times
...
...
whitehathehe
4 years ago
Again, this is a personal device. You cannot perform FDE/Remote wipe. Should be A and F
upvoted 2 times
LB54
3 years, 10 months ago
The question isn't asking whether or not the user will let your encrypt their device. It's asking which two options would protect the data the best in the event that the device was lost/stolen? Full Device Encryption: Prevents who ever finds/steals device from accessing data long enough to... Remote Wipe.
upvoted 1 times
...
...
simo77
4 years, 1 month ago
if the phone lost or stolen needs to be set to a remote wipe + full disk encryption
upvoted 1 times
...
mercy2020
4 years, 2 months ago
the correct answer is remote wipe and storage segmentation. Example 2: John, a member of the sales team, who has been using his tablet for BYOD, has just won the National Lottery and decided to leave the company. During the offboarding phase, he was asked to reset his tablet to its factory settings to ensure that the data was deleted. John has refused to do this as he has personal data and music files on the tablet. The company has called the local Police and accused him of stealing their data. John informed the police officer that this is his personal device with his own data, and he produced a copy of the sales receipt for the device. The police officer was powerless and could do nothing further. The company would have to take John to court and prove that the data was theirs. John is now traveling the world, leaving the company with a further headache—they cannot take John to court because they don't know which country he is in. If they had used storage segmentation and asked John for the storage card on exit, this scenario would never have occurred.
upvoted 3 times
...
nakres64
4 years, 3 months ago
A and E are the correct answers. FDE: corporate-owned devices Remote Wipe erase all the data --> is not proper to BYOD More information in Darrils' Book PDF: p. 397
upvoted 2 times
nakres64
4 years, 3 months ago
A and F sorry for the Typo..
upvoted 2 times
...
...
mcNik
4 years, 4 months ago
FDE is not an option here. I believe Storage segmentation is preferred over containerization since we don't protect application but just data. Data on that segment should be encrypted and we all agree on that. Remote wipe would be needed to wipe this segment in case phone is lost or stolen. But encrypting entire device and wiping all for BYOD is just not right.
upvoted 2 times
ekinzaghi
3 years, 10 months ago
how does segmentation protect coporate data from theft ?
upvoted 1 times
...
...
agapetus
4 years, 5 months ago
I duckduckgo'd this question and I got two different sets of answers.
upvoted 3 times
...
certpro
4 years, 5 months ago
These two are to protect company data when exposed - FDE and remote wipe
upvoted 1 times
...
mindtricks
4 years, 5 months ago
eldaulo seems correct. This question sucks though. I believe its A &F
upvoted 3 times
...
NYF
4 years, 5 months ago
Why not A and D since it is BYOD.
upvoted 3 times
Cindan
4 years, 2 months ago
The device is not within the company. As BYOD policy people can take their devices when they leave the company. Contanarization not possible if they leave the company
upvoted 2 times
[Removed]
4 years, 2 months ago
You can wipe the contents within the container with remote wipe. I remember BlackBerry UEM had this where you could wipe the container and everything in it remotely even if someone with BYOD left.
upvoted 2 times
...
...
...
Mento
4 years, 6 months ago
Correct.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...