12
answers
1
watching
174
views

An organization is considering a BYOD standard to support remote working. The first iteration of the solution will utilize only approved collaboration applications and the ability to move corporate data between those applications. The security team has concerns about the following:

✑ Unstructured data being exfiltrated after an employee leaves the organization

✑ Data being exfiltrated as a result of compromised credentials

✑ Sensitive information in emails being exfiltrated

Which of the following solutions should the security team implement to mitigate the risk of data loss?

  1. Mobile device management, remote wipe, and data loss detection
  2. Conditional access, DoH, and full disk encryption
  3. Mobile application management, MFA, and DRM
  4. Certificates, DLP, and geofencing

For unlimited access to Homework Help, a Homework+ subscription is required.

Avatar image
Liked by myrrcenary and 2 others

Unlock all answers

Get 1 free homework help answer.
Already have an account? Log in
Avatar image
Liked by myrrcenary and 2 others
Already have an account? Log in
Avatar image
Liked by myrrcenary and 3 others
Already have an account? Log in
Avatar image
Liked by myrrcenary and 3 others
Already have an account? Log in
Avatar image
Liked by myrrcenary and 1 others
Already have an account? Log in
Avatar image
Liked by myrrcenary and 3 others
Already have an account? Log in
Avatar image
Liked by myrrcenary and 3 others
Already have an account? Log in
Avatar image
Liked by myrrcenary and 3 others
Already have an account? Log in
Avatar image
Liked by myrrcenary and 1 others
Already have an account? Log in
Avatar image
Read by 1 person
Already have an account? Log in
Avatar image
Read by 1 person
Already have an account? Log in
Avatar image
Read by 1 person
Already have an account? Log in

Related questions

Related Documents

Weekly leaderboard

Start filling in the gaps now
Log in