nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #158

CERTIFIED-IN-CYBERSECURITY Question #158: Real Exam Question with Answer & Explanation

The correct answer is B: Containerization. Containerization allows users to run corporate applications and access corporate data in a secure environment that applications outside the container cannot access. Containerization solutions for mobile devices typically use encryption and other isolation techniques to ensure tha

Security Operations

Question

On a BYOD model, which of these technologies is best suited to keep corporate data and applications separate from personal?

Options

  • AFull-device encryption
  • BContainerization
  • CBiometrics
  • DContext-aware authentication

Explanation

Containerization allows users to run corporate applications and access corporate data in a secure environment that applications outside the container cannot access. Containerization solutions for mobile devices typically use encryption and other isolation techniques to ensure that data and applications do not cross over. Full-device encryption helps reduce the risk of theft or loss of a device, thereby reducing the risk of a data breach. Biometrics and context-aware authentication are helpful in ensuring that the right user is using a device, but do not guarantee this separation themselves (see ISC2 Study Guide, chapter 4, module 3).

Topics

#BYOD#Containerization#Data Separation#Endpoint Security

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions