A company has a BYOD policy that includes tablets and smart phones. In the case of a legal investigation, which of the following poses the greatest security issues?
A. Recovering sensitive documents from a device if the owner is unable or unwilling to cooperate
B. Making a copy of all of the files on the device and hashing them after the owner has provided the PIN
C. Using GPS services to locate the device owner suspected in the investigation
D. Wiping the device from a remote location should it be identified as a risk in the investigation
Answer: A. Recovering sensitive documents from a device if the owner is unable or unwilling to cooperate
You might also like to view...
The biggest advantage of Voice over Internet Protocol (VoIP) is _____.
A. ?cost savings B. ?voice clarity C. ?high-quality streaming of movies and television shows D. ?0% downtime
If you are using a desktop or laptop, defragment the computer's hard disk should you notice a decline in the computer's performance.
Answer the following statement true (T) or false (F)
When a process requests pages, Linux loads them into memory. When the kernel needs the memory space, the pages are released using a most recently used (MRU) algorithm.
Answer the following statement true (T) or false (F)
Which type of analysis do IDSs usually do?
attack signature detection anomaly detection Both attack signature detection and anomaly detection Neither attack signature detection nor anomaly detection