An organization, which handles large volumes of PII, allows mobile devices that can process, store, and transmit PII and other sensitive data to be issued to employees. Security assessors can demonstrate recovery and decryption of remnant sensitive data from device storage after MDM issues a successful wipe command. Assuming availability of the controls, which of the following would BEST protect against the loss of sensitive data in the future?
A) Implement a container that wraps PII data and stores keying material directly in the container's encrypted application space.
B) Use encryption keys for sensitive data stored in an eFuse-backed memory space that is blown during remote wipe.
C) Issue devices that employ a stronger algorithm for the authentication of sensitive data stored on them.
D) Procure devices that remove the bootloader binaries upon receipt of an MDM-issued remote wipe command.
Correct Answer:
Verified
Q199: A security engineer is embedded with a
Q200: An organization is considering the use of
Q201: A company has created a policy to
Q202: A security engineer is attempting to increase
Q203: The Chief Executive Officer (CEO) of a
Q205: A company is not familiar with the
Q206: A security analyst is reviewing the following
Q207: A security engineer is attempting to convey
Q208: After a large organization has completed the
Q209: A company is transitioning to a new
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents