medium
Single Answer
0

The company Charles works for has recently had a stolen company cell phone result in a data breach. Charles wants to prevent future incidents of a similar nature. Which of the following mitigation techniques would be the most effective?

Answer Options

A

Enable FDE via MDM.

B

A firewall change.

C

A DLP rule.

D

A new URL filter rule.

Correct Answer: A

Explanation

A variety of configuration changes could be pushed to mobile devices to help: setting passcodes, enabling full-disk encryption (FDE) on mobile devices via organizationally deployed mobile device management (MDM), or even preventing some sensitive files from being downloaded or kept on those devices could all help. Firewall rules, data loss preven- tion (DLP) rules, and URL filters will not prevent a stolen device from being accessed and the data being exposed.