In: Computer Science
Staff members are reporting an unusual number of device thefts associated with time out of the office. Thefts increased soon after the company deployed a new social networking app.
Which of the following should the Chief Information Security Officer (CISO) recommend implementing? SELECT ONE
A. Automatic location check-ins
B. Geolocated presence privacy
C. Integrity controls
D. NAC checks to quarantine devices
PLEASE ALSO STATE THE CORRECT ANSWER AS WELL AS WHY THE OTHER ANSWERS ARE WRONG, THANKS
Answer)
D) NAC checks to quarantine devices.
NAC is called Network Access Control which can find the identification of the devices, this also results in checking the compliance with respect to the corporate security policy, This also depends on the result where the end device is allowed the access to that of the application as well as the corporate network.
When there is an end device that is not complying then it gets disconnected.
This has real-time and also helps in recognizing the clients and also it excludes any of the unknown devices from that of the network and makes a restriction to the accessibility of the devices.
A) Automatic location check-ins even when used will not be effective as it will only show the location where the check-in is made but the user will still be able to take away the device and make changes to disable the automatic check-in
B) Geolocated presence privacy, this seems to take the location of the device whereas it encounters the other risk, like tracking of the devices and manipulation of the devices locations and settings etc
C) It is not only about managing the integrity of the data only but also finding where the theft is made and what are the changes or data that are being breaches
Hope this answer helps.
If you find the answer useful please hit like.
Thanks