A company has just experienced a data breach that affected all mobile devices.
Which of the following would BEST secure access to user's mobile devices? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E. F.AF.
The best ways to secure access to user's mobile devices after a data breach are full device encryption and OS security updates. Here's why:
A. Full device encryption: This option is important because it ensures that any data on the device is protected even if the device is lost or stolen. Encryption means that data is scrambled and can only be unscrambled with a key. Full device encryption ensures that all data on the device is encrypted and cannot be accessed without the key. This protects against data breaches, as even if an unauthorized person gains access to the device, they won't be able to read any of the data on it.
E. OS security updates: These updates are essential for keeping the mobile device secure against known vulnerabilities and exploits. Whenever a new vulnerability is discovered, the OS vendor releases a security patch to fix it. Without regular security updates, mobile devices are vulnerable to known exploits that can be used to steal data or gain access to the device.
B, C, D, and F are not the BEST options for securing access to user's mobile devices after a data breach. Here's why:
B. Remote backup application: A remote backup application is useful for backing up data from a mobile device, but it does not provide any security for the device itself.
C. SSO authentication: Single Sign-On (SSO) authentication allows users to log in to multiple applications using a single set of credentials. While SSO can make it easier for users to access their applications, it does not provide any security for the mobile device itself.
D. Device profiles update: Updating device profiles is important for ensuring that devices are configured properly for security and management, but it does not provide any security for the device itself.
F. Biometric authentication: Biometric authentication, such as fingerprint or facial recognition, is useful for verifying the identity of a user, but it does not provide any additional security for the device itself. Additionally, biometric authentication can be bypassed in some cases, making it less secure than full device encryption.