PdfPrep.com

Which of the following controls can the organization implement to reduce the risk of similar breaches?

A company recently implemented a new cloud storage solution and installed the required synchronization client on all company devices. A few months later, a breach of sensitive data was discovered. Root cause analysis shows the data breach happened from a lost personal mobile device.

Which of the following controls can the organization implement to reduce the risk of similar breaches?
A . Biometric authentication
B . Cloud storage encryption
C . Application containerization
D . Hardware anti-tamper

Answer: A

Exit mobile version