Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam Cybersecurity-Audit-Certificate Topic 1 Question 13 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 13
Topic #: 1
[All Cybersecurity-Audit-Certificate Questions]

Which of the following presents the GREATEST risk to corporate data pertaining to mobile device usage?

Show Suggested Answer Hide Answer
Suggested Answer: D

Replicating privileged access to a user's own mobile device presents the greatest risk to corporate data. This is because it potentially allows unauthorized access to sensitive information if the device is lost, stolen, or compromised. Privileged access means having elevated permissions that are typically reserved for administrators. When such access is available on a personal device, it bypasses many of the security controls that a company would normally have in place.

Option A, remote wipe, is actually a security feature that can protect data if a device is lost or stolen. Option B, lack of training, can increase risk but does not directly expose data like privileged access does. Option C, devices not obtained through corporate provisioning, can be a risk, but this risk is generally less than that of replicating privileged access.


Contribute your Thoughts:

Lottie
11 months ago
I disagree with I think B is the biggest risk as end users lacking training in mobile device management can lead to unintentional data leaks.
upvoted 0 times
...
Maryanne
11 months ago
I believe C is also a significant risk, if the mobile device is not obtained through corporate provisioning, it may not have necessary security measures.
upvoted 0 times
...
Jacob
11 months ago
I agree with allowing privileged access on personal devices could lead to data breaches.
upvoted 0 times
...
Tricia
11 months ago
I think the greatest risk is D, privileged access being replicated to the user's own mobile device.
upvoted 0 times
...
Phil
11 months ago
I disagree with Kimi, I think B is the biggest risk as end users lacking training in mobile device management can lead to unintentional data leaks.
upvoted 0 times
...
Kimi
12 months ago
I believe C is also a significant risk, if the mobile device is not obtained through corporate provisioning, it may not have necessary security measures.
upvoted 0 times
...
Virgie
12 months ago
I agree with Leonida, allowing privileged access on personal devices could lead to data breaches.
upvoted 0 times
...
Leonida
12 months ago
I think the greatest risk is D, privileged access being replicated to the user's own mobile device.
upvoted 0 times
...
Patrick
1 years ago
Definitely. I'm going with D as well. The other options are important, but they don't hold a candle to the risk of privileged access getting out there.
upvoted 0 times
...
Kristel
1 years ago
Haha, yikes! That must have been a fun conversation with the boss. But you're right, privileged access is the biggest issue here. Can't trust people to keep that stuff secure on their own devices.
upvoted 0 times
...
Norah
1 years ago
You guys are spot on. I remember one time our IT guy accidentally sent his login credentials to his personal email. That was a heart attack waiting to happen.
upvoted 0 times
...
Marget
1 years ago
Yeah, I'd go with D. Privileged access is just a massive security hole. Better to keep that stuff on company-issued devices that can be properly managed.
upvoted 0 times
Lenita
11 months ago
Definitely, privileged access on personal devices is a no-go.
upvoted 0 times
...
Dalene
11 months ago
I agree, D seems like the biggest risk.
upvoted 0 times
...
Emerson
1 years ago
It's definitely important to have control over how devices are obtained to ensure security measures are in place.
upvoted 0 times
...
Tracey
1 years ago
C) The mobile device is not obtained through corporate provisioning.
upvoted 0 times
...
Francene
1 years ago
That's a valid point. Without proper training, users can unknowingly put data at risk.
upvoted 0 times
...
Deonna
1 years ago
B) End users are not trained in mobile device management.
upvoted 0 times
...
Jacob
1 years ago
True, but I think having privileged access on personal devices is even riskier.
upvoted 0 times
...
Na
1 years ago
A) The mobile device may be subject to remote wipe.
upvoted 0 times
...
Francine
1 years ago
Yeah, I agree. That's a major risk for corporate data security.
upvoted 0 times
...
Catherin
1 years ago
D) Privileged access is replicated to the user's own mobile device.
upvoted 0 times
...
...
Simona
1 years ago
I agree with that. If an employee has access to sensitive corporate data on their personal device, that's a recipe for disaster. Remote wipe is important, but it's not as big of a risk as giving people too much access.
upvoted 0 times
...
Kanisha
1 years ago
This is a tricky question. I think the biggest risk is privileged access being replicated to the user's own mobile device. That's a huge security vulnerability waiting to happen.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77