New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 6 Question 87 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 87
Topic #: 6
[All CISSP Questions]

Which of the following features is MOST effective in mitigating against theft of data on a corporate mobile device Which has stolen?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Norah
3 months ago
Key escrow sounds risky, not sure about that one.
upvoted 0 times
...
Willard
3 months ago
VPNs are great, but they don’t stop theft.
upvoted 0 times
...
Bernardo
3 months ago
Wait, can tracking really help if the device is off?
upvoted 0 times
...
Mammie
4 months ago
I think MDM with device wipe is more effective.
upvoted 0 times
...
Augustine
4 months ago
Whole device encryption is a must!
upvoted 0 times
...
Alease
4 months ago
I’m leaning towards VPN with traffic encryption, but I’m not confident it directly prevents theft. I think we discussed how it mainly protects data in transit rather than on the device itself.
upvoted 0 times
...
Rosenda
4 months ago
I recall that MDM with device wipe was often mentioned as a strong option in our study materials. It seems like a good way to ensure data is erased if the device is stolen.
upvoted 0 times
...
Kris
4 months ago
I feel like mobile device tracking could help locate the device, but it doesn't really protect the data itself. I guess it depends on what we define as "mitigating theft."
upvoted 0 times
...
Laticia
5 months ago
I think whole device encryption is really important, but I'm not sure if it's the most effective. I remember a practice question where MDM was highlighted as a key feature.
upvoted 0 times
...
Shenika
5 months ago
Virtual private network encryption is also a really important one. That will protect the data in transit, even if the device itself is compromised.
upvoted 0 times
...
Krystina
5 months ago
Okay, I've got this. The most effective feature is definitely mobile device management with remote wipe capabilities. That way, you can quickly secure the device if it's stolen.
upvoted 0 times
...
Daniela
5 months ago
Hmm, I'm a bit unsure about this one. There are a few options that seem relevant, but I'll need to think it through carefully.
upvoted 0 times
...
Belen
5 months ago
This seems like a straightforward security question. I'll focus on the key features that can protect against data theft on a mobile device.
upvoted 0 times
...
Barb
5 months ago
Okay, let me think this through step-by-step. Experience Sites are designed to create engaging digital experiences, and storefronts are a key component of that. I believe the maximum number of storefronts that can be added is 2.0, so I'll go with option B.
upvoted 0 times
...
Felicia
5 months ago
I feel a bit lost on this one. Was it NS or ACS for the Action Type? I can never keep them straight!
upvoted 0 times
...
Wade
10 months ago
Whole device encryption with key escrow? Sounds like a fancy way of saying 'make sure the thief can't access your data'. I like it!
upvoted 0 times
...
Beth
10 months ago
Mobile device tracking with geolocation? Really? That's like trying to catch a thief by throwing a GPS tracker at them. Not the most effective solution, in my opinion.
upvoted 0 times
Rosalyn
9 months ago
D) Virtual Private Network (VPN) with traffic encryption
upvoted 0 times
...
Arlette
9 months ago
B) Mobile Device Management (MDM) with device wipe
upvoted 0 times
...
Deeanna
9 months ago
A) Whole device encryption with key escrow
upvoted 0 times
...
...
Erick
10 months ago
Virtual Private Network (VPN) with traffic encryption is a good choice. It protects the data in transit, but doesn't address the physical security of the device itself. Still, it's a solid option.
upvoted 0 times
Kristine
9 months ago
D) Virtual Private Network (VPN) with traffic encryption is a good choice for securing data in transit, but it's important to consider other security measures as well.
upvoted 0 times
...
Yoko
9 months ago
B) Mobile Device Management (MDM) with device wipe is crucial in case the device is stolen to remotely wipe sensitive data.
upvoted 0 times
...
Fidelia
10 months ago
A) Whole device encryption with key escrow is also important to protect the data stored on the device.
upvoted 0 times
...
...
Misty
10 months ago
I'd go with Mobile Device Management (MDM) with device wipe. It gives the company the ability to remotely erase the device, which can prevent sensitive data from falling into the wrong hands.
upvoted 0 times
Reta
10 months ago
B) Mobile Device Management (MDM) with device wipe
upvoted 0 times
...
Hermila
10 months ago
A) Whole device encryption with key escrow
upvoted 0 times
...
...
Deangelo
10 months ago
Whole device encryption with key escrow is the most effective option. It ensures that even if the device is stolen, the data remains secure and inaccessible to unauthorized users.
upvoted 0 times
...
Fredric
11 months ago
I personally think option D) Virtual Private Network with traffic encryption is also important to protect data in transit.
upvoted 0 times
...
Loren
11 months ago
I agree with Allene, because wiping the device remotely can prevent unauthorized access to sensitive data.
upvoted 0 times
...
Allene
11 months ago
I think option B) Mobile Device Management with device wipe is the most effective.
upvoted 0 times
...

Save Cancel