If the device is encrypted then they can't get at the data. The other answers don't work because what if its turned off or no signal. Remote wipe won't work. Geolocate won't work. Even if you could locate it, then what? The police won't do anything.
Because in case of encryption, they will instead purge/format the drives to sell it on the market, so the first thing a thief does is to not activate any geolocating services, including going online
While A seems good, D is bether as MDM with device wipe: Relies on internet connectivity and timely execution. If the device is offline, data remains vulnerable until the wipe command is received
The most effective feature to mitigate data theft if a corporate mobile device is stolen is the ability to remotely wipe the device via MDM. Completely erase all corporate data and applications to prevent unauthorized access.
LOL it is like chicken and eggs kind of scenario here. You need both A and D and Strong Password + auto-wipe after 3 failed attempts. I hate these types of questions :)
can't really see the additional value of key escrow in this scenario -it just means a trusted 3rd party also has the key to be released in specific circumstances. So I went with A. It not only covers D as others indicated (including a form of key escrow) but also might help against brute forcing the PIN or password to get access to the device & data anyway. (even if remote wipe is not quite perfect, too)
Answer A) Mobile Device Management (MDM) with device wipe
Keep in mind that all new phones should already have hardware encryption...so D is already covered.
MDM solutions offer tons of features such as application level encryption, remote wipe and other policies to secure the phone.
A. Mobile Device Management (MDM) with device wipe
Mobile Device Management (MDM) with the ability to remotely wipe the device is the most effective feature for mitigating against data theft on a corporate mobile device that has been stolen. When a device is stolen, it's critical to ensure that sensitive corporate data doesn't fall into the wrong hands. MDM allows administrators to remotely wipe all data from the stolen device, rendering it useless to the thief and protecting the data.
From the Official Study Guide 9th edition - page 438
Personal electronic device security features can often be managed using a mobile device management (MDM) or unified endpoint management (UEM) solutions. These include device authentiation, full device encryption, communication protection, remote wiping, device lockout, screen locks, GPS and location service management, content management, application control, push notification management .........
Could've been stolen while he was talking on it so it was obviously unlocked. Many videos of people getting phones stolen while talking on them. Tough question. Gpt-3.5 and 4 say MDM
From the Official Study Guide 9th edition - page 410
Some mobile devices, including portable computers, tablets, and mobile phones, may offer
full-device encryption (FDE). Many mobile devices either are pre-encrypted or can be
encrypted by the user/owner. Once a mobile device is encrypted, the user’s data is protected
whenever the screen is locked, which causes the physical data port on the device to be disabled. This prevents unauthorized access to data on the device through a physical cable connection as long as the screen remains locked. Most if not all of the storage media of a device can be encrypted, this is usually a worthwhile feature to enable. However, encryption isn’t a guarantee of protection for data, especially if the device is stolen while unlocked or if the system itself has a known backdoor attack vulnerability.
MDM is also at end of life and about to get deprecated to be replaced by UEM, which combines MDM and EMM (enterprise mobility management)
I THINK A = widely used and looks promising. Some phones support, majority dont support FDE.
also pg 410 ""However, encryption isn’t a guarantee of protection for data, especially if the device is stolen while unlocked or if the system itself has a known backdoor attack vulnerability"
This section is not available anymore. Please use the main Exam Page.CISSP Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Humongous1593
Highly Voted 2 years, 8 months agoZapepelele
6 months agoMaximillian
10 months agoClay
2 years, 5 months agoSerliop378
2 years agojackdryan
2 years, 1 month agokrassko
Highly Voted 2 years, 8 months agoa_kto_to
Most Recent 3 weeks, 4 days agoBigITGuy
2 months, 2 weeks agodeeden
10 months, 1 week agoCCNPWILL
1 year agogjimenezf
1 year, 4 months agoJ_Ko
2 months, 2 weeks agoYesPlease
1 year, 5 months agoBoyBastos
1 year, 9 months agonat0220
2 years agobabaseun
2 years, 2 months agoTommyZ
2 years, 2 months agoDee83
2 years, 4 months agowedso
2 years, 5 months agoHava_2013
2 years, 7 months agoJamati
2 years, 7 months agoikidreamz
2 years, 5 months agobabaseun
2 years, 2 months agofranbarpro
2 years, 7 months ago