The Chief Executive Officer (CEO) of a corporation purchased the latest mobile device and wants
to connect it to the company’s internal network. The Chief Information Security Officer (CISO) was
told to research and recommend how to secure this device.
Which of the following recommendations should be implemented to keep the device from posing a
security risk to the company?
A.
A corporate policy to prevent sensitive information from residing on a mobile device and antivirus software.
B.
Encryption of the non-volatile memory and a corporate policy to prevent sensitive information
from residing on a mobile device.
C.
Encryption of the non-volatile memory and a password or PIN to access the device.
D.
A password or PIN to access the device and a corporate policy to prevent sensitive information
from residing on a mobile device.