CERTIFIED-IN-CYBERSECURITY · Question #441
CERTIFIED-IN-CYBERSECURITY Question #441: Real Exam Question with Answer & Explanation
The correct answer is D: Ensuring that the device is configured securely. Ensuring that the device is securely configured is one of the challenges of a Bring Your Own Device (BYOD) policy (see ISC2 Study Guide, Chapter 5, Module 3). With a BYOD policy, employees use their personal devices for work purposes. Implementing this policy is challenging becau
Question
What is one of the challenges presented by a Bring Your Own Device (BYOD) policy?
Options
- ADecrease in employee morale
- BEnsuring privacy control
- CIncreasing the need for forensic audits
- DEnsuring that the device is configured securely
Explanation
Ensuring that the device is securely configured is one of the challenges of a Bring Your Own Device (BYOD) policy (see ISC2 Study Guide, Chapter 5, Module 3). With a BYOD policy, employees use their personal devices for work purposes. Implementing this policy is challenging because the organization has no control over these devices and therefore cannot ensure that they are securely configured. For example, an employee may use a personal smartphone to access company email. If this smartphone is not securely configured, it could be vulnerable to attacks that could compromise corporate data. The remaining options do not accurately represent the challenges of a BYOD policy. A decrease in employee morale is not typically a challenge associated with BYOD policies. In fact, such policies often increase morale by allowing employees to use devices they are familiar with. Ensuring privacy control can be a challenge, but it is not specific to BYOD policies. Finally, increasing the need for forensic audits is not a direct challenge to BYOD policies. While the use of personal devices could potentially increase the complexity of a forensic audit, this is not a primary challenge of implementing a BYOD policy.
Topics
Community Discussion
No community discussion yet for this question.