CERTIFIED-IN-CYBERSECURITY · Question #158
CERTIFIED-IN-CYBERSECURITY Question #158: Real Exam Question with Answer & Explanation
The correct answer is B: Containerization. Containerization allows users to run corporate applications and access corporate data in a secure environment that applications outside the container cannot access. Containerization solutions for mobile devices typically use encryption and other isolation techniques to ensure tha
Question
On a BYOD model, which of these technologies is best suited to keep corporate data and applications separate from personal?
Options
- AFull-device encryption
- BContainerization
- CBiometrics
- DContext-aware authentication
Explanation
Containerization allows users to run corporate applications and access corporate data in a secure environment that applications outside the container cannot access. Containerization solutions for mobile devices typically use encryption and other isolation techniques to ensure that data and applications do not cross over. Full-device encryption helps reduce the risk of theft or loss of a device, thereby reducing the risk of a data breach. Biometrics and context-aware authentication are helpful in ensuring that the right user is using a device, but do not guarantee this separation themselves (see ISC2 Study Guide, chapter 4, module 3).
Topics
Community Discussion
No community discussion yet for this question.