New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Cybersecurity-Audit-Certificate Exam - Topic 3 Question 48 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 48
Topic #: 3
[All Cybersecurity-Audit-Certificate Questions]

What would be an IS auditor's BEST response to an IT managers statement that the risk associated with the use of mobile devices in an organizational setting is the same as for any other device?

Show Suggested Answer Hide Answer
Suggested Answer: A

The BEST response to an IT manager's statement that the risk associated with the use of mobile devices in an organizational setting is the same as for any other device is thatreplication of privileged access and the greater likelihood of physical loss increases risk levels. Mobile devices pose unique risks to an organization due to their portability, connectivity, and functionality. Mobile devices may store or access sensitive data or systems that require privileged access, which can be compromised if the device is lost, stolen, or hacked. Mobile devices also have a higher chance of being misplaced or taken by unauthorized parties than other devices.


Contribute your Thoughts:

0/2000 characters
Jose
9 hours ago
I disagree, B) seems too optimistic about mobile risks.
upvoted 0 times
...
German
6 days ago
Option A is the way to go. Mobile devices are like a digital Swiss Army knife - they can do a lot, but that also means a lot of risk.
upvoted 0 times
...
Alpha
11 days ago
Haha, the IT manager must be living in a fantasy world if they think the risk is the same. Mobile devices are a security nightmare!
upvoted 0 times
...
Felicidad
16 days ago
B? Really? Mobile devices are a hacker's dream come true. The risk is definitely higher than other devices.
upvoted 0 times
...
Jackie
21 days ago
C is also a valid point. The controls for mobile devices may not be as effective as those for workstations.
upvoted 0 times
...
Maurine
26 days ago
I agree with A. The increased mobility and access privileges of mobile devices make them a prime target for cyber attacks.
upvoted 0 times
...
Wynell
1 month ago
I thought option D sounded good because of the ability to wipe devices, but I’m not convinced it fully addresses all the risks involved.
upvoted 0 times
...
Lilli
1 month ago
I feel like we had a practice question about mobile device risks, and I think the answer highlighted that they can't be treated the same as other devices.
upvoted 0 times
...
Margurite
1 month ago
I’m not entirely sure, but I think the controls for mobile devices need to be different from those for workstations.
upvoted 0 times
...
Charolette
2 months ago
I'm a bit confused by the wording of the options. I think A is the best choice, but I'm not 100% sure why the other options wouldn't be appropriate responses.
upvoted 0 times
...
Rebecka
2 months ago
I'm pretty confident A is the best answer here. Mobile devices introduce additional attack vectors and risks that need to be specifically addressed, beyond just standard device controls.
upvoted 0 times
...
France
2 months ago
I'm leaning towards A. Mobile devices do seem to have some heightened risks compared to other devices, even if they can be mitigated. The wording of the options makes me a bit unsure, though.
upvoted 0 times
...
Orville
2 months ago
I remember discussing how mobile devices have unique risks, like physical loss, which can be more significant than traditional devices.
upvoted 0 times
...
Charlesetta
2 months ago
Option A seems to be the best response. Mobile devices pose a higher risk due to the potential for data breaches and physical loss.
upvoted 0 times
...
Buffy
2 months ago
A) makes total sense, mobile devices are way more vulnerable.
upvoted 0 times
...
Holley
3 months ago
D is interesting, but wiping isn't always foolproof.
upvoted 0 times
...
Ruby
3 months ago
Hmm, I think the key here is recognizing that mobile devices introduce some unique risks like replication of privileged access and physical loss. Option A seems to capture that well.
upvoted 0 times
...
Hector
3 months ago
I'm not sure about this one. The IT manager's statement seems a bit oversimplified, but I'm not confident I fully understand the nuances of the risks associated with mobile devices.
upvoted 0 times
Martha
3 months ago
Definitely, physical loss is a big concern.
upvoted 0 times
...
...

Save Cancel