A company has a BYOD policy that includes tablets and smart phones. In the case of a legal investigation, which of the following poses the greatest security issues?

A. Recovering sensitive documents from a device if the owner is unable or unwilling to cooperate
B. Making a copy of all of the files on the device and hashing them after the owner has provided the PIN
C. Using GPS services to locate the device owner suspected in the investigation
D. Wiping the device from a remote location should it be identified as a risk in the investigation

Answer: A. Recovering sensitive documents from a device if the owner is unable or unwilling to cooperate

Computer Science & Information Technology

You might also like to view...

Which of the following incident response plan steps would MOST likely engaging business professionals with the security team to discuss changes to existing procedures?

A. Recovery B. Incident identification C. Isolation / quarantine D. Lessons learned E. Reporting

Computer Science & Information Technology

A Trojan horse might allow a hacker to _____.

A. see the contents of your screen B. capture your login keystrokes C. control your Webcam D. all of the above

Computer Science & Information Technology