SY0-501 · Question #43
SY0-501 Question #43: Real Exam Question with Answer & Explanation
The correct answer is E: MDM software. To meet security policy requirements for difficult-to-tag travel tablets needing unique identifiers for inventory, Mobile Device Management (MDM) software should be implemented.
Question
A company has a security policy that specifies all endpoint computing devices should be assigned a unique identifier that can be tracked via an inventory management system. Recent changes to airline security regulations have cause many executives in the company to travel with mini tablet devices instead of laptops. These tablet devices are difficult to tag and track. An RDP application is used from the tablet to connect into the company network. Which of the following should be implemented in order to meet the security policy requirements?
Options
- AVirtual desktop infrastructure (IDI)
- BWS-security and geo-fencing
- CA hardware security module (HSM)
- DRFID tagging system
- EMDM software
- FSecurity Requirements Traceability Matrix (SRTM)
Explanation
To meet security policy requirements for difficult-to-tag travel tablets needing unique identifiers for inventory, Mobile Device Management (MDM) software should be implemented.
Common mistakes.
- A. Virtual Desktop Infrastructure (VDI) provides virtual desktops hosted on servers, which centralizes data but does not manage or assign unique identifiers to the physical tablet device itself.
- B. WS-security secures web service messages, and geo-fencing restricts access based on location, neither of which addresses assigning unique identifiers for physical device inventory.
- C. A Hardware Security Module (HSM) is used to safeguard cryptographic keys and perform cryptographic operations, not to manage or track general endpoint computing devices like tablets.
- D. RFID tagging systems use physical tags for tracking, but the question explicitly states that these tablet devices are difficult to tag, making RFID an unsuitable solution for this specific challenge.
- F. A Security Requirements Traceability Matrix (SRTM) is a documentation tool for mapping requirements, not a technical solution for managing and tracking endpoint devices.
Concept tested. Mobile Device Management (MDM) for endpoint inventory and security
Reference. https://learn.microsoft.com/en-us/mem/intune/fundamentals/what-is-intune
Community Discussion
No community discussion yet for this question.