Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CISA topic 1 question 713 discussion

Actual exam question from Isaca's CISA
Question #: 713
Topic #: 1
[All CISA Questions]

Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD) policy to help prevent data leakage?

  • A. Specify employee responsibilities for reporting lost or stolen BYOD devices.
  • B. Require multi-factor authentication on BYOD devices.
  • C. Require employees to waive privacy rights related to data on BYOD devices.
  • D. Allow only registered BYOD devices to access the network.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
KAP2HURUF
22 hours, 39 minutes ago
Selected Answer: D
Option D, allowing only registered BYOD devices to access the network, is the most effective recommendation for preventing data leakage. Registering devices enables better control and visibility, allowing the organization to enforce security policies, track device access, and remotely wipe data if necessary. While other options offer some level of protection, they are not as comprehensive: Option A is important for incident response but doesn’t actively prevent data leakage. Option B enhances access security but doesn’t address data stored on the device itself. Option C raises ethical and legal concerns and may not be enforceable.
upvoted 1 times
...
a84n
2 months, 1 week ago
Selected Answer: D
Answer D only authorized devices, which have been vetted and meet security standards, are permitted to access the organization's network.
upvoted 1 times
...
SuperMax
9 months, 1 week ago
Selected Answer: B
B. Require multi-factor authentication on BYOD devices. Multi-factor authentication (MFA) adds an extra layer of security to ensure that only authorized users can access company data from their BYOD devices. It typically involves something the user knows (like a password) and something the user has (like a smartphone or a hardware token). This helps protect against unauthorized access even if the device is lost or stolen. While the other options (A, C, and D) may also be important elements of a BYOD policy, they do not directly address data leakage prevention as effectively as implementing multi-factor authentication.
upvoted 1 times
...
Broesweelies
11 months, 1 week ago
Selected Answer: B
B. Require multi-factor authentication on BYOD devices. Requiring multi-factor authentication on BYOD devices adds an extra layer of security that can significantly reduce the risk of unauthorized access and data leakage. It ensures that even if a device is lost or stolen, unauthorized individuals cannot easily gain access to sensitive company data.
upvoted 1 times
...
JONESKA
11 months, 3 weeks ago
Answer should be B. to use the MFA. option D is a good practice for network security, but it does not specifically address data leakage prevention which what the question is asking.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
ex Want to SAVE BIG on Certification Exam Prep?
close
ex Unlock All Exams with ExamTopics Pro 75% Off
  • arrow Choose From 1000+ Exams
  • arrow Access to 10 Exams per Month
  • arrow PDF Format Available
  • arrow Inline Discussions
  • arrow No Captcha/Robot Checks
Limited Time Offer
Ends in