PrepAway - Latest Free Exam Questions & Answers

Which of the following should be implemented in order to meet the security policy requirements?

A company has a security policy that specifies all endpoint computing devices should be assigned
a unique identifier that can be tracked via an inventory management system. Recent changes to
airline security regulations have cause many executives in the company to travel with mini tablet
devices instead of laptops. These tablet devices are difficult to tag and track. An RDP application
is used from the tablet to connect into the company network. Which of the following should be
implemented in order to meet the security policy requirements?

PrepAway - Latest Free Exam Questions & Answers

A.
Virtual desktop infrastructure (IDI)

B.
WS-security and geo-fencing

C.
A hardware security module (HSM)

D.
RFID tagging system

E.
MDM software

F.
Security Requirements Traceability Matrix (SRTM)

One Comment on “Which of the following should be implemented in order to meet the security policy requirements?

  1. meac says:

    Correct answer is inded E: MDM (Mobile Device Management)
    Mobile device management is an industry term for the administration of mobile devices, such as smartphones, tablet computers, laptops and desktop computers.
    MDM is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices.
    It has many great features such as :
    * Full details of the device
    * Who the device is allocated to
    * GPS Positioning
    * White listing
    * Black listing
    * Remote wipe
    * and much more




    1



    0

Leave a Reply