Exam CISA All QuestionsBrowse all questions from this exam
Question 366

Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's bring your own device (BYOD) policy?

    Correct Answer: B

    The greatest concern for an IS auditor should be if the policy does not include the right to audit BYOD devices. Without the ability to audit these devices, the organization lacks visibility into how devices are being used, whether they comply with security policies, and if there are any potential risks. This is essential for ensuring compliance with security policies, identifying potential security breaches, and protecting sensitive data. While implementing a mobile device management (MDM) solution is also important, the right to audit is fundamental for maintaining security and control over devices connected to the organization's network.

Discussion
SBD600Option: B

When reviewing an organization's bring your own device (BYOD) policy, the greatest concern for an IS auditor should be if the policy does not include the right to audit BYOD devices. This is crucial because it is essential for the organization to maintain visibility and control over the devices to ensure compliance with security policies, protect sensitive data, and maintain a secure environment.

Aly

C: a mobile device management solution is critical in a BYOD environment as it allows the organization to enforce security policies, manage and monitor devices, and protect sensitive data. Without an MDM solution in place, the organization would have limited control and visibility over the devices connected to their network, increasing the risk of unauthorized access, data breaches, and other security incidents.

cidigi

The devices do not belong to the organisation, they have no right to audit personal devices. :). The only thing an organisation can do regarding BYOD is to implement a MDM in case of loss or data leakage.

RachyOption: C

C. That's the correct answer

SwallowsOption: C

The right to audit BYOD devices is crucial for ensuring compliance with security policies, identifying potential security breaches, and protecting sensitive data. Without the ability to audit BYOD devices, the organization lacks visibility into device usage, security configurations, and potential risks. This can lead to unauthorized access, data breaches, and compliance violations. While other concerns, such as the absence of a mobile device management (MDM) solution, are also important, the inability to audit BYOD devices presents a significant security and compliance risk. Without auditing capabilities, the organization cannot effectively monitor and enforce security policies, leaving it vulnerable to security incidents and data breaches.