Certified Cloud Security Professional – CCSP – Question412

To protect data on user devices in a BYOD environment, the organization should consider requiring all the following, except:

A.
Multifactor authentication
B. DLP agents
C. Two-person integrity
D. Local encryption

Correct Answer: C

Explanation:

Explanation: Although all the other options are ways to harden a mobile device, two-person integrity is a concept that has nothing to do with the topic, and, if implemented, would require everyone in your organization to walk around in pairs while using their mobile devices.