A company has a BYOD policy that includes tablets and smart phones. In the case of a legal investigation, which of the following poses the greatest security issues?

A. Recovering sensitive documents from a device if the owner is unable or unwilling to cooperate
B. Making a copy of all of the files on the device and hashing them after the owner has provided the PIN
C. Using GPS services to locate the device owner suspected in the investigation
D. Wiping the device from a remote location should it be identified as a risk in the investigation


Answer: A. Recovering sensitive documents from a device if the owner is unable or unwilling to cooperate

Computer Science & Information Technology

You might also like to view...

The biggest advantage of Voice over Internet Protocol (VoIP) is _____.

A. ?cost savings B. ?voice clarity C. ?high-quality streaming of movies and television shows D. ?0% downtime

Computer Science & Information Technology

If you are using a desktop or laptop, defragment the computer's hard disk should you notice a decline in the computer's performance.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When a process requests pages, Linux loads them into memory. When the kernel needs the memory space, the pages are released using a most recently used (MRU) algorithm.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which type of analysis do IDSs usually do?

attack signature detection anomaly detection Both attack signature detection and anomaly detection Neither attack signature detection nor anomaly detection

Computer Science & Information Technology