the most important security feature for a mobile device management (MDM) program is the ability to remotely wipe devices. This feature allows the information security manager to quickly and effectively remove sensitive data from a lost or stolen device, reducing the risk of data breaches and unauthorized access to sensitive information.
A. I would say B but knowing the management answers ISACA likes i chose A. There are so many types of mobile devices that can be on a network...Sell phones are not the only mobile devices that can be on a network. Additionally, Inventory of assets is a security feature since it provides security visibility into the devices. You will need to know the Authorized devices on a network so you can alerted when the unauthorized devices joins you. It all starts with inventory and visibility.
If the mobile devices is lost or an employee had been terminated, company want to make sure all business data doesn't go to unauthorised personnel. That is usually main objective for getting MDM. Inventory comes later for reporting and setting metrics such as which devices is not up to date, jailbreak, root, which the MDM policies will be implement. Such as block the devices from connecting to corporate application. So yes A and B is correct. Ultimately, company wanted to take control of their business data. So I will say B most appropriate.
B. Ability to remotely wipe devices.
Features like inventory management, locating devices, and pushing updates are important for effective mobile device management, the ability to remotely wipe devices takes precedence because it directly addresses data security and confidentiality concerns.
B - https://mobiletrans.wondershare.com/mobile-device-management/mdm-features-and-functions.html#:~:text=Part%201%3A%2010%20Must-Have%20Mobile%20Device%20Management%20Features,...%208%208.%20BYOD%20Support%20...%20More%20items
B. Ability to remotely wipe devices.
Features like inventory management, locating devices, and pushing updates are important for effective mobile device management, the ability to remotely wipe devices takes precedence because it directly addresses data security and confidentiality concerns.
The good response is either B or D. Indeed identifying a device is only a pre-condition to achieve the most important security features, to say ability to wipe data remotely and to push updates and patches to the device.
This section is not available anymore. Please use the main Exam Page.CISM Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Broesweelies
Highly Voted 1 year, 10 months ago[Removed]
1 year, 4 months agoe891cd1
Most Recent 8 months agoafoo1314
8 months, 1 week agoMarcelus1714
8 months, 2 weeks agooluchecpoint
10 months agojcisco123
11 months, 1 week agopeelu
11 months, 2 weeks agoXJ
1 year agooluchecpoint
1 year, 2 months agotodush
1 year, 3 months agoGoseu
1 year, 4 months agokaranvp
1 year, 5 months agorichck102
1 year, 5 months agoDravidian
1 year, 7 months agoCarlPTY07
1 year, 8 months agoHaniMAlsh
1 year, 10 months agoaokisan
1 year, 11 months ago