If an organization wants to implement a BYOD policy, which of the following administrative control policy considerations MUST be addressed? (Select two)
A. Data archiving
B. Data ownership
C. Geo-tagging
D. Acceptable use
E. Remote wipe
4 Comments on “which of the following administrative control policy considerations MUST be addressed?”
Studentsays:
Should be B & D, C is not right
0
0
Paul Ssays:
Geotagging is not an administrative control but a technical one. Defining who owns the data and what can you do are both administrative controls. B&D
0
0
Mikesays:
I think B & D, although E looks good too!
0
0
SuperMariosays:
I agree with you all. It is B & D
The differentiation in here is about “Administrative” control (=static) and “Technical” control (=-dynamic)
Administrative: This does not affect the configuration of the device, hence is a static activity.
Rules are written, users read the rules and abide by them (so one hopes)
B. Data ownership
D. Acceptable use
Technical: This does affect the configuration of the device, hence is a dynamic activity.
The following three activities can be enabled/disabled/configured
A. Data archiving
C. Geo-tagging
E. Remote wipe
Should be B & D, C is not right
0
0
Geotagging is not an administrative control but a technical one. Defining who owns the data and what can you do are both administrative controls. B&D
0
0
I think B & D, although E looks good too!
0
0
I agree with you all. It is B & D
The differentiation in here is about “Administrative” control (=static) and “Technical” control (=-dynamic)
Administrative: This does not affect the configuration of the device, hence is a static activity.
Rules are written, users read the rules and abide by them (so one hopes)
B. Data ownership
D. Acceptable use
Technical: This does affect the configuration of the device, hence is a dynamic activity.
The following three activities can be enabled/disabled/configured
A. Data archiving
C. Geo-tagging
E. Remote wipe
0
0