Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
A Bring Your Own Device (BYOD) strategy introduces significant security risks, such as:
Unsecured personal devices accessing corporate data,
Lack of consistent controls over all endpoints,
Potential for data leakage or loss.
The BEST way to initially address these risks is through a mobile device awareness program, which:
Educates users on security policies and acceptable use,
Raises awareness about risks like phishing, unsecured networks, and unauthorized apps,
Reinforces behaviors that protect organizational data on personal devices.
Without user understanding and compliance, technical controls can be undermined.
Why not the others?
A. Mobile device testing program
➤ Useful for technical validation, but doesn’t address human behavior and awareness—key in BYOD contexts.
B. Mobile device upgrade program
➤ Helps keep software and hardware secure, but not sufficient on its own.
D. Mobile device tracking program
➤ Helpful for locating lost devices, but doesn’t mitigate most security risks BYOD introduces.
This educates employees on the organization's BYOD policies, security practices, and potential risks, ensuring they understand their responsibilities in maintaining the security of their personal devices when accessing corporate resources.
Effective awareness programs can significantly reduce the likelihood of security incidents caused by employee negligence or lack of understanding, such as downloading malicious apps, connecting to insecure networks, or mishandling sensitive data.
A. Mobile device testing program
The best way to address the security risks associated with a recently implemented bring your own device (BYOD) strategy is to establish a mobile device testing program (Option A). Such a program involves testing and evaluating the security posture of various types of mobile devices that employees bring into the organization's environment. This helps identify vulnerabilities, security gaps, and potential risks associated with those devices. By conducting thorough testing, the organization can implement appropriate security controls and measures to mitigate the identified risks and ensure a secure BYOD environment.
can t bear the stype of this CISA questions. this results in confusion, i hope i could leverage such great advanced understanding to achieve more in REAL exam and social network.
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.CISA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
007Georgeo
Highly Voted 1Â year, 9Â months agoGreens
Most Recent 1Â month, 3Â weeks ago1Naa
7Â months, 2Â weeks agoa84n
9Â months, 1Â week agoSwallows
9Â months, 3Â weeks agofori12
10Â months, 1Â week agolsiau76
1Â year, 5Â months agomibg83
1Â year, 7Â months agoEric0223
2Â years ago