Exam SY0-601 All QuestionsBrowse all questions from this exam
Question 679

A company recently experienced a significant data loss when proprietary information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An investigation confirmed the corporate network was not breached, but documents were downloaded from an employee's COPE tablet and passed to the competitor via cloud storage. Which of the following is the best mitigation strategy to prevent this from happening in the future?

    Correct Answer: C

    To prevent future data leaks like the one experienced, implementing Mobile Device Management (MDM) is the best strategy. MDM allows for centralized control and management of mobile devices, including tablets, which were involved in this data breach. With MDM, organizations can enforce security policies, such as data encryption, device passcode requirements, and restrictions on data sharing. It can also monitor device activity and remotely wipe devices if necessary. These features collectively help in preventing unauthorized downloads and exfiltration of sensitive information from company devices.

Discussion
damianUYOption: C

This is a typical question with many concepts to confuse. The key is to look at the incident; the incident involved an employee using a TABLET, downloading a file, and then uploading it to a competitor's cloud. The text does not specify that the employee used their own cloud to transfer the file, which would be odd, meaning they would download the file and then place it on their own cloud, and then what, grant access to the competitor? It doesn't make sense. In my opinion, the best solution is an MDM with specific policies prohibiting the download and exfiltration of data. The key point is that they mention it was a tablet. The answer, in my view, is MDM.

Jackwasblk

Exactly lol 😂 download, just to upload to their own cloud storage, just to send it from there. Mind you how obvious this would be to get caught

russianOption: C

not casb on this one guys

johnabayotOption: B

B. CASB In this scenario, a CASB could have prevented the employee from downloading sensitive documents from the corporate network to their personal device, or from uploading them to a cloud storage service that is not sanctioned by the company.

memodrums

This would be true if there was context saying that the company's infrastructure resided in the cloud. Since it does not provide that info, I would assume its C.

PeshokpOption: C

If the COPE device doesn't have an MDM solution, the employee can disconnect from the company network and connect to a hotspot to a public network, where there is no DLP or CASB ,bypassing all company network security.

shady23Option: B

B. CASB

durelOption: C

mdm is the answer

DrCo6991Option: B

Along with DChilds comments regarding other similar questions, I'd like to add question 698 as a reference for you all. You'll see again that MDM is not an option. and CASB is the correct answer.

BD69Option: A

CASB is only going to work if the data was uploaded via the company's cloud storage, if they were using the competitor's cloud storage (which they did), CASB would be useless. B) is definitely the wrong answer.

JasonMunozOption: B

Management (MDM) solutions are primarily designed to manage and secure mobile devices (such as tablets and smartphones) within an organization. While MDM can help enforce security policies on devices, it doesn’t specifically address data leakage via cloud storage. MDM focuses more on device management and less on cloud data protection. In conclusion, the answer is B.) CASB

kaixinOption: B

Not MDM because you need MAM to stop prevent this.

shady23Option: B

The CASB serves as a policy enforcement center, consolidating multiple security policy enforcement functions and applying themto everything your business uses in the cloud—regardless of the kind of device attempting to access it, including unmanaged smartphones and personal laptops. The company took special precautions by using proper labels for data. If you set such a CASB policy that restricts uploading those data that was labeled as sensitive, one cannot upload it to the cloud storage. measures such as containerization or encryption. References: https://www.blackberry.com/us/en/solutions/corporate-owned-personally-enabled https://www.professormesser.com/security-plus/sy0-601/sy0-601-video/mobile-device-management/

9e20f4fOption: B

were downloaded from the cloud and passed to the cloud. B

spearousOption: B

MDM is not correct, because you can't prevent an employee to download company's data to his device, when he is really in need of that data. so MDM won't work. the only behavior that pass the line is, he uploaded the data to the cloud. this is should be blocked. I see some argue CASB is only for own cloud, well, CASB can be installed in 3rd party cloud, search for "CASB AWS" and you will see how amazon provide CASB to his customer.

russianOption: C

mobile device management

GeronemoOption: C

Here's why: MDM solutions provide centralized control over mobile devices, allowing organizations to enforce security policies, manage device configurations, and remotely monitor and manage devices. By implementing MDM, the company can: Enforce security policies: MDM allows the company to enforce policies such as data encryption, device passcode requirements, and restrictions on data sharing to prevent unauthorized access to sensitive information. Monitor and manage devices: MDM solutions enable the company to remotely monitor device activity, track device location, and remotely wipe devices in case of loss or theft. This helps prevent unauthorized access to sensitive data stored on the device. Control app installation and usage: MDM allows the company to control which apps can be installed and used on employee devices. This can prevent employees from using unauthorized apps or accessing unauthorized cloud storage services where sensitive data could be leaked.

dbdbfb0Option: C

After putting some thought into this question, here is what I think the important factor is. The question states "documents were downloaded from an employee's COPE tablet". This seems to me to be the point of failure in the scenario. Having said that, I think the best option to correct that would be MDM. With MDM the data would be protected through classification and tagging (which is stated in the scenario) and the use of data encryption.

buscan422Option: C

With MDM you can block app store which can prevent this