A company is deploying smartphones for its mobile salesforce. These devices are for personal and business use but are owned by the company. Sales personnel will save new customer data via a custom application developed for the company. This application will integrate with the contact information stored in the smartphones and will populate new customer records onto it. The customer application's data is encrypted at rest, and the application's connection to the back office system is considered secure. The Chief Information Security Officer (CISO) has concerns that customer contact information may be accidentally leaked due to the limited security capabilities of the devices and the planned controls. Which of the following will be the MOST efficient security control to implement to lower this risk?
A) Implement a mobile data loss agent on the devices to prevent any user manipulation with the contact information.
B) Restrict screen capture features on the devices when using the custom application and the contact information.
C) Restrict contact information storage dataflow so it is only shared with the customer application.
D) Require complex passwords for authentication when accessing the contact information.
Correct Answer:
Verified
Q791: An in-house penetration tester has been asked
Q792: A Chief Information Security Officer (CISO) has
Q793: Upon entering an incorrect password, the logon
Q794: A company is evaluating cloud providers to
Q795: A security administrator has written a script
Q797: User from two organizations, each with its
Q798: Joe, a salesman, was assigned to a
Q799: Which of the following refers to the
Q800: A security technician is configuring an access
Q801: A security auditor is testing perimeter security
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents