CCSP Exam QuestionsBrowse all questions from this exam

CCSP Exam - Question 411


To protect data on user devices in a BYOD environment, the organization should consider requiring all the following, except:

Show Answer
Correct Answer: C

To protect data on user devices in a BYOD environment, the organization should consider requiring measures that directly enhance data security and access control, such as multifactor authentication, DLP agents, and local encryption. Two-person integrity is a security measure typically used to ensure sensitive actions are approved by two individuals, which is not relevant to protecting data on user devices in a BYOD context. It is impractical and unnecessary for mobile device security.

Discussion

3 comments
Sign in to comment
akg001Option: C
Nov 22, 2024

C. Two-person integrity

MaciekMTOption: C
Feb 24, 2025

In a Bring Your Own Device (BYOD) environment, organizations must implement security controls to protect data on user devices. Measures like multifactor authentication (MFA), DLP agents, and local encryption help ensure that sensitive data remains secure. However, Two-Person Integrity (TPI) is not a standard or practical control for BYOD. Why Not the Others? A. Multifactor Authentication (MFA) → Ensures secure access by requiring multiple factors (e.g., password + biometrics or token) to authenticate users. B. Data Loss Prevention (DLP) Agents → Prevents unauthorized data transfer or leakage from user devices. D. Local Encryption → Encrypts sensitive data stored on BYOD devices, protecting it from unauthorized access if the device is lost or stolen.

MaciekMTOption: C
Feb 24, 2025

Why "Two-Person Integrity" (TPI) is Incorrect? TPI is a security principle requiring two individuals to authorize or perform critical actions (e.g., launching nuclear missiles or handling highly classified information). It is not relevant or practical for managing user devices in a BYOD environment.