New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Cybersecurity-Audit-Certificate Exam - Topic 1 Question 13 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 13
Topic #: 1
[All Cybersecurity-Audit-Certificate Questions]

Which of the following presents the GREATEST risk to corporate data pertaining to mobile device usage?

Show Suggested Answer Hide Answer
Suggested Answer: D

Replicating privileged access to a user's own mobile device presents the greatest risk to corporate data. This is because it potentially allows unauthorized access to sensitive information if the device is lost, stolen, or compromised. Privileged access means having elevated permissions that are typically reserved for administrators. When such access is available on a personal device, it bypasses many of the security controls that a company would normally have in place.

Option A, remote wipe, is actually a security feature that can protect data if a device is lost or stolen. Option B, lack of training, can increase risk but does not directly expose data like privileged access does. Option C, devices not obtained through corporate provisioning, can be a risk, but this risk is generally less than that of replicating privileged access.


Contribute your Thoughts:

0/2000 characters
Noel
3 months ago
C is a problem, corporate devices are way more secure.
upvoted 0 times
...
Nettie
3 months ago
A remote wipe is just a safety feature, not a risk.
upvoted 0 times
...
Deeann
3 months ago
Surprised that people still use unapproved devices, that's risky!
upvoted 0 times
...
Lashunda
4 months ago
I think D is the biggest issue, too much access on personal devices.
upvoted 0 times
...
Annabelle
4 months ago
Definitely B, lack of training is a huge risk!
upvoted 0 times
...
Sanjuana
4 months ago
D seems really risky to me; replicating privileged access could lead to major data breaches if the device is compromised.
upvoted 0 times
...
Myrtie
4 months ago
I remember a practice question about provisioning, so I feel like C could be a significant risk too.
upvoted 0 times
...
Truman
4 months ago
I'm not sure about A; I thought remote wipe was a security feature, not a risk.
upvoted 0 times
...
Tamekia
5 months ago
I think option B makes sense because if users aren't trained, they might not follow security protocols.
upvoted 0 times
...
Pauline
5 months ago
I'm confident B is the right answer. End users not being trained is a huge security gap when it comes to mobile devices in the workplace.
upvoted 0 times
...
Natalya
5 months ago
I'm leaning towards C - the mobile device not being obtained through corporate provisioning. That lack of control seems like the biggest vulnerability.
upvoted 0 times
...
Tenesha
5 months ago
Option D about privileged access on personal devices seems like the biggest risk to me. That could really expose sensitive corporate data.
upvoted 0 times
...
Ilene
5 months ago
Hmm, I'm a bit unsure here. I'm trying to weigh the risks of remote wipe, lack of corporate provisioning, and privileged access on personal devices.
upvoted 0 times
...
Tina
5 months ago
This question seems straightforward, I think the answer is B - end users not being trained in mobile device management.
upvoted 0 times
...
Osvaldo
5 months ago
I'm confident that the correct answer is B. An Architecture Compliance review is all about ensuring the technical aspects of the project are on track and ready to move forward.
upvoted 0 times
...
Darrin
5 months ago
Ugh, I hate these types of questions. Calculus is not my strong suit. I'll do my best to work through it, but I'm probably going to have to guess on this one.
upvoted 0 times
...
Phillip
5 months ago
Hmm, I'm a bit stumped on this one. I know Divalproex Sodium can have some serious side effects, but I'm not totally sure which specific labs need to be monitored. I'll have to review my notes on this drug.
upvoted 0 times
...
Lottie
2 years ago
I disagree with I think B is the biggest risk as end users lacking training in mobile device management can lead to unintentional data leaks.
upvoted 0 times
...
Maryanne
2 years ago
I believe C is also a significant risk, if the mobile device is not obtained through corporate provisioning, it may not have necessary security measures.
upvoted 0 times
...
Jacob
2 years ago
I agree with allowing privileged access on personal devices could lead to data breaches.
upvoted 0 times
...
Tricia
2 years ago
I think the greatest risk is D, privileged access being replicated to the user's own mobile device.
upvoted 0 times
...
Phil
2 years ago
I disagree with Kimi, I think B is the biggest risk as end users lacking training in mobile device management can lead to unintentional data leaks.
upvoted 0 times
...
Kimi
2 years ago
I believe C is also a significant risk, if the mobile device is not obtained through corporate provisioning, it may not have necessary security measures.
upvoted 0 times
...
Virgie
2 years ago
I agree with Leonida, allowing privileged access on personal devices could lead to data breaches.
upvoted 0 times
...
Leonida
2 years ago
I think the greatest risk is D, privileged access being replicated to the user's own mobile device.
upvoted 0 times
...
Patrick
2 years ago
Definitely. I'm going with D as well. The other options are important, but they don't hold a candle to the risk of privileged access getting out there.
upvoted 0 times
...
Kristel
2 years ago
Haha, yikes! That must have been a fun conversation with the boss. But you're right, privileged access is the biggest issue here. Can't trust people to keep that stuff secure on their own devices.
upvoted 0 times
...
Norah
2 years ago
You guys are spot on. I remember one time our IT guy accidentally sent his login credentials to his personal email. That was a heart attack waiting to happen.
upvoted 0 times
...
Marget
2 years ago
Yeah, I'd go with D. Privileged access is just a massive security hole. Better to keep that stuff on company-issued devices that can be properly managed.
upvoted 0 times
Lenita
2 years ago
Definitely, privileged access on personal devices is a no-go.
upvoted 0 times
...
Dalene
2 years ago
I agree, D seems like the biggest risk.
upvoted 0 times
...
Emerson
2 years ago
It's definitely important to have control over how devices are obtained to ensure security measures are in place.
upvoted 0 times
...
Tracey
2 years ago
C) The mobile device is not obtained through corporate provisioning.
upvoted 0 times
...
Francene
2 years ago
That's a valid point. Without proper training, users can unknowingly put data at risk.
upvoted 0 times
...
Deonna
2 years ago
B) End users are not trained in mobile device management.
upvoted 0 times
...
Jacob
2 years ago
True, but I think having privileged access on personal devices is even riskier.
upvoted 0 times
...
Na
2 years ago
A) The mobile device may be subject to remote wipe.
upvoted 0 times
...
Francine
2 years ago
Yeah, I agree. That's a major risk for corporate data security.
upvoted 0 times
...
Catherin
2 years ago
D) Privileged access is replicated to the user's own mobile device.
upvoted 0 times
...
...
Simona
2 years ago
I agree with that. If an employee has access to sensitive corporate data on their personal device, that's a recipe for disaster. Remote wipe is important, but it's not as big of a risk as giving people too much access.
upvoted 0 times
...
Kanisha
2 years ago
This is a tricky question. I think the biggest risk is privileged access being replicated to the user's own mobile device. That's a huge security vulnerability waiting to happen.
upvoted 0 times
...

Save Cancel