Which of the following provides the BEST method for evaluating the potential threats?

Posted by: Pdfprep Category: CAS-001 Tags: , ,

The sales division within a large organization purchased touch screen tablet computers for all 250 sales representatives in an effort to showcase the use of technology to its customers and increase productivity. This includes the development of a new product tracking application that works with the new platform. The security manager attempted to stop the deployment because the equipment and application are non-standard and unsupported within the organization. However, upper management decided to continue the deployment.

Which of the following provides the BEST method for evaluating the potential threats?
A . Conduct a vulnerability assessment to determine the security posture of the new devices and the application.
B . Benchmark other organization’s that already encountered this type of situation and apply all relevant learning’s and industry best practices.
C . Work with the business to understand and classify the risk associated with the full lifecycle of the hardware and software deployment.
D . Develop a standard image for the new devices and migrate to a web application to eliminate locally resident data.

Answer: C

Leave a Reply

Your email address will not be published.