CIPP-E Exam QuestionsBrowse all questions from this exam

CIPP-E Exam - Question 49


Read the following steps:

Discover which employees are accessing cloud services and from which devices and apps

Lock down the data in those apps and devices

Monitor and analyze the apps and devices for compliance

Manage application life cycles -

Monitor data sharing -

An organization should perform these steps to do which of the following?

Show Answer
Correct Answer: C

The steps described are part of maintaining a secure BYOD program, where employees use their own devices to access cloud services. These steps include discovering which employees are using which devices and apps, locking down data, monitoring compliance, managing application life cycles, and monitoring data sharing. These actions ensure that security risks associated with BYOD are mitigated.

Discussion

3 comments
Sign in to comment
pauldhugOption: B
May 3, 2023

B is the answer

zero46Option: C
Dec 20, 2023

Devices, monitoring compliance - BYOD

drluvkashyapOption: B
Aug 6, 2023

B is the right answer as The steps described in the question are all part of a secure BYOD program. A BYOD program allows employees to use their own devices for work purposes. This can be a convenient and cost-effective way for employees to work, but it also introduces security risks. To mitigate these risks, organizations need to implement a secure BYOD program. This includes steps such as: Discovering which employees are accessing cloud services and from which devices and apps. Locking down the data in those apps and devices. Monitoring and analyzing the apps and devices for compliance. Managing application life cycles. Monitoring data sharing.

Cippe
Sep 1, 2023

You are saying B is right but your explanation is pointing towards C