Which of the following should be implemented in order to meet the security policy requirements?

A company has a security policy that specifies all endpoint computing devices should be assigned a unique identifier that can be tracked via an inventory management system. Recent changes to airline security regulations have cause many executives in the company to travel with mini tablet devices instead of laptops. These tablet devices are difficult to tag and track. An RDP application is used from the tablet to connect into the company network.

Which of the following should be implemented in order to meet the security policy requirements?
A . Virtual desktop infrastructure (IDI)
B . WS-security and geo-fencing
C . A hardware security module (HSM)
D . RFID tagging system
E . MDM software
F . Security Requirements Traceability Matrix (SRTM)

Answer: E

Latest SY0-501 Dumps Valid Version with 1130 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments