Posted by: Pdfprep
Post Date: November 10, 2020
A company recently implemented a new cloud storage solution and installed the required synchronization client on all company devices. A few months later, a breach of sensitive data was discovered. Root cause analysis shows the data breach happened from a lost personal mobile device.
Which of the following controls can the organization implement to reduce the risk of similar breaches?
A . Biometric authentication
B . Cloud storage encryption
C . Application containerization
D . Hardware anti-tamper
Answer: A
Leave a Reply