CISA Exam QuestionsBrowse all questions from this exam

CISA Exam - Question 238


An organization allows employees to use personally owned mobile devices to access customers' personal information. Which of the following is MOST important for an IS auditor to verify?

Show Answer
Correct Answer: AD

When employees are allowed to use personally owned mobile devices to access customers' personal information, the priority must be to ensure that the information is secure and protected from unauthorized access. Implementing mobile device security policies is the most important action an organization can take to safeguard sensitive data. These policies can address various aspects such as encryption, password management, remote wipe capabilities, and other security measures that are crucial for maintaining data integrity and confidentiality. This is more critical than simply having employees sign an acceptable use policy or checking device compatibility and storage capabilities.

Discussion

10 comments
Sign in to comment
007GeorgeoOption: D
May 5, 2023

Allowing employees to use personally owned mobile devices to access customers' personal information can increase the risk of unauthorized access or disclosure of the information. Therefore, it is critical that the organization implements appropriate security policies and controls to protect the information.

MunaMOption: D
Sep 8, 2022

seems answer is D

[Removed]Option: A
Dec 13, 2023

An employee BYOD agreement or acceptable use agreement (AUA) should require the employee to agree with the items in the policy before the device can be used for business purposes. Since it's a personal device and not a company mobile device, enforcing security policies might not be possible

Rachy
Jan 15, 2024

This is apt… thinking about personal experience, I only signed acceptable use agreement and now aware of any security policy

2022cisaOption: D
Oct 10, 2022

Yes, even i think it should be D

swmasindeOption: D
Mar 17, 2023

Also think D is the answer

3008Option: A
Apr 29, 2023

a is correct

3008Option: D
Apr 29, 2023

d is correct

blues_leeOption: D
Jan 30, 2024

D. Mobile device security policies have been implemented

caanasOption: D
Apr 21, 2024

Acceptable usage policy is a part of Information security policy. If security policy is implemented, it takes care of option "A". Hence my answer will be "D".

analuisamoreiraOption: D
Jun 26, 2024

D. makes more sense for me